blob: a20e60ee2bf3071a4c688561cb324f4350e3f92b [file] [log] [blame]
J. Richard Barnette24adbf42012-04-11 15:04:53 -07001# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Dale Curtisaa5eedb2011-08-23 16:18:52 -07002# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
Aviv Keshet74c89a92013-02-04 15:18:30 -08005import functools
Darren Krahn0bd18e82015-10-28 23:30:46 +00006import json
J. Richard Barnette1d78b012012-05-15 13:56:30 -07007import logging
Dan Shi0f466e82013-02-22 15:44:58 -08008import os
Simran Basid5e5e272012-09-24 15:23:59 -07009import re
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070010import time
11
mussa584b4462014-06-20 15:13:28 -070012import common
J. Richard Barnette45e93de2012-04-11 17:24:15 -070013from autotest_lib.client.bin import utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070014from autotest_lib.client.common_lib import autotemp
Richard Barnette0c73ffc2012-11-19 15:21:18 -080015from autotest_lib.client.common_lib import error
16from autotest_lib.client.common_lib import global_config
Dan Shi549fb822015-03-24 18:01:11 -070017from autotest_lib.client.common_lib import lsbrelease_utils
J. Richard Barnette45e93de2012-04-11 17:24:15 -070018from autotest_lib.client.common_lib.cros import autoupdater
Richard Barnette03a0c132012-11-05 12:40:35 -080019from autotest_lib.client.common_lib.cros import dev_server
Gabe Blackb72f4fb2015-01-20 16:47:13 -080020from autotest_lib.client.common_lib.cros.graphite import autotest_es
Gabe Black1e1c41b2015-02-04 23:55:15 -080021from autotest_lib.client.common_lib.cros.graphite import autotest_stats
Hsinyu Chaoe0b08e62015-08-11 10:50:37 +000022from autotest_lib.client.cros import constants as client_constants
J. Richard Barnette84890bd2014-02-21 11:05:47 -080023from autotest_lib.client.cros import cros_ui
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +080024from autotest_lib.client.cros.audio import cras_utils
Katherine Threlkeldab83d392015-06-18 16:45:57 -070025from autotest_lib.client.cros.input_playback import input_playback
Mussa5b589052015-10-26 17:55:26 -070026from autotest_lib.client.cros.video import constants as video_test_constants
Simran Basi5ace6f22016-01-06 17:30:44 -080027from autotest_lib.server import afe_utils
MK Ryu35d661e2014-09-25 17:44:10 -070028from autotest_lib.server import autoserv_parser
29from autotest_lib.server import autotest
30from autotest_lib.server import constants
31from autotest_lib.server import crashcollect
Dan Shia1ecd5c2013-06-06 11:21:31 -070032from autotest_lib.server import utils as server_utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070033from autotest_lib.server.cros import provision
Scott Zawalski89c44dd2013-02-26 09:28:02 -050034from autotest_lib.server.cros.dynamic_suite import constants as ds_constants
Simran Basi5e6339a2013-03-21 11:34:32 -070035from autotest_lib.server.cros.dynamic_suite import tools, frontend_wrappers
Dan Shi9cb0eec2014-06-03 09:04:50 -070036from autotest_lib.server.cros.faft.config.config import Config as FAFTConfig
Scottfe06ed82015-11-05 17:15:01 -080037from autotest_lib.server.cros.servo import plankton
Fang Deng96667ca2013-08-01 17:46:18 -070038from autotest_lib.server.hosts import abstract_ssh
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +080039from autotest_lib.server.hosts import chameleon_host
Scottfe06ed82015-11-05 17:15:01 -080040from autotest_lib.server.hosts import plankton_host
Fang Deng5d518f42013-08-02 14:04:32 -070041from autotest_lib.server.hosts import servo_host
Simran Basidcff4252012-11-20 16:13:20 -080042from autotest_lib.site_utils.rpm_control_system import rpm_client
Simran Basid5e5e272012-09-24 15:23:59 -070043
44
Dan Shib8540a52015-07-16 14:18:23 -070045CONFIG = global_config.global_config
46
Eric Carusoee673ac2015-08-05 17:03:04 -070047LUCID_SLEEP_BOARDS = ['samus', 'lulu']
48
Dan Shid07ee2e2015-09-24 14:49:25 -070049# A file to indicate provision failure and require Repair job to powerwash the
50# dut.
51PROVISION_FAILED = '/var/tmp/provision_failed'
52
beepsc87ff602013-07-31 21:53:00 -070053class FactoryImageCheckerException(error.AutoservError):
54 """Exception raised when an image is a factory image."""
55 pass
56
57
Fang Deng0ca40e22013-08-27 17:47:44 -070058class CrosHost(abstract_ssh.AbstractSSHHost):
J. Richard Barnette45e93de2012-04-11 17:24:15 -070059 """Chromium OS specific subclass of Host."""
60
Simran Basi5ace6f22016-01-06 17:30:44 -080061 VERSION_PREFIX = provision.CROS_VERSION_PREFIX
62
J. Richard Barnette45e93de2012-04-11 17:24:15 -070063 _parser = autoserv_parser.autoserv_parser
Scott Zawalski62bacae2013-03-05 10:40:32 -050064 _AFE = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
J. Richard Barnette45e93de2012-04-11 17:24:15 -070065
Richard Barnette03a0c132012-11-05 12:40:35 -080066 # Timeout values (in seconds) associated with various Chrome OS
67 # state changes.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070068 #
Richard Barnette0c73ffc2012-11-19 15:21:18 -080069 # In general, a good rule of thumb is that the timeout can be up
70 # to twice the typical measured value on the slowest platform.
71 # The times here have not necessarily been empirically tested to
72 # meet this criterion.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070073 #
74 # SLEEP_TIMEOUT: Time to allow for suspend to memory.
Richard Barnette0c73ffc2012-11-19 15:21:18 -080075 # RESUME_TIMEOUT: Time to allow for resume after suspend, plus
76 # time to restart the netwowrk.
J. Richard Barnette84890bd2014-02-21 11:05:47 -080077 # SHUTDOWN_TIMEOUT: Time to allow for shut down.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070078 # BOOT_TIMEOUT: Time to allow for boot from power off. Among
Richard Barnette0c73ffc2012-11-19 15:21:18 -080079 # other things, this must account for the 30 second dev-mode
J. Richard Barnette417cc792015-10-01 09:56:36 -070080 # screen delay, time to start the network on the DUT, and the
81 # ssh timeout of 120 seconds.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070082 # USB_BOOT_TIMEOUT: Time to allow for boot from a USB device,
Richard Barnette0c73ffc2012-11-19 15:21:18 -080083 # including the 30 second dev-mode delay and time to start the
J. Richard Barnetted4649c62013-03-06 17:42:27 -080084 # network.
beepsf079cfb2013-09-18 17:49:51 -070085 # INSTALL_TIMEOUT: Time to allow for chromeos-install.
J. Richard Barnette84890bd2014-02-21 11:05:47 -080086 # POWERWASH_BOOT_TIMEOUT: Time to allow for a reboot that
87 # includes powerwash.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070088
89 SLEEP_TIMEOUT = 2
J. Richard Barnetted4649c62013-03-06 17:42:27 -080090 RESUME_TIMEOUT = 10
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +080091 SHUTDOWN_TIMEOUT = 10
J. Richard Barnette417cc792015-10-01 09:56:36 -070092 BOOT_TIMEOUT = 150
J. Richard Barnette5bab5f52015-08-03 13:14:38 -070093 USB_BOOT_TIMEOUT = 300
J. Richard Barnette7817b052014-08-28 09:47:29 -070094 INSTALL_TIMEOUT = 480
Dan Shi2c88eed2013-11-12 10:18:38 -080095 POWERWASH_BOOT_TIMEOUT = 60
Chris Sosab76e0ee2013-05-22 16:55:41 -070096
Dan Shica503482015-03-30 17:23:25 -070097 # Minimum OS version that supports server side packaging. Older builds may
98 # not have server side package built or with Autotest code change to support
99 # server-side packaging.
Dan Shib8540a52015-07-16 14:18:23 -0700100 MIN_VERSION_SUPPORT_SSP = CONFIG.get_config_value(
Dan Shiced09e42015-04-17 16:09:34 -0700101 'AUTOSERV', 'min_version_support_ssp', type=int)
Dan Shica503482015-03-30 17:23:25 -0700102
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800103 # REBOOT_TIMEOUT: How long to wait for a reboot.
104 #
Chris Sosab76e0ee2013-05-22 16:55:41 -0700105 # We have a long timeout to ensure we don't flakily fail due to other
106 # issues. Shorter timeouts are vetted in platform_RebootAfterUpdate.
Simran Basi1160e2c2013-10-04 16:00:24 -0700107 # TODO(sbasi - crbug.com/276094) Restore to 5 mins once the 'host did not
108 # return from reboot' bug is solved.
109 REBOOT_TIMEOUT = 480
Chris Sosab76e0ee2013-05-22 16:55:41 -0700110
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800111 # _USB_POWER_TIMEOUT: Time to allow for USB to power toggle ON and OFF.
112 # _POWER_CYCLE_TIMEOUT: Time to allow for manual power cycle.
113 _USB_POWER_TIMEOUT = 5
114 _POWER_CYCLE_TIMEOUT = 10
115
Dan Shib8540a52015-07-16 14:18:23 -0700116 _RPM_RECOVERY_BOARDS = CONFIG.get_config_value('CROS',
Richard Barnette82c35912012-11-20 10:09:10 -0800117 'rpm_recovery_boards', type=str).split(',')
118
119 _MAX_POWER_CYCLE_ATTEMPTS = 6
120 _LAB_MACHINE_FILE = '/mnt/stateful_partition/.labmachine'
Fang Dengdeba14f2014-11-14 11:54:09 -0800121 _RPM_HOSTNAME_REGEX = ('chromeos(\d+)(-row(\d+))?-rack(\d+[a-z]*)'
122 '-host(\d+)')
Katherine Threlkeldab83d392015-06-18 16:45:57 -0700123 _LIGHTSENSOR_FILES = [ "in_illuminance0_input",
124 "in_illuminance_input",
125 "in_illuminance0_raw",
126 "in_illuminance_raw",
127 "illuminance0_input"]
Richard Barnette82c35912012-11-20 10:09:10 -0800128 _LIGHTSENSOR_SEARCH_DIR = '/sys/bus/iio/devices'
129 _LABEL_FUNCTIONS = []
Aviv Keshet74c89a92013-02-04 15:18:30 -0800130 _DETECTABLE_LABELS = []
Kevin Cheng3a4a57a2015-09-30 12:09:50 -0700131 label_decorator = functools.partial(server_utils.add_label_detector,
132 _LABEL_FUNCTIONS,
Aviv Keshet74c89a92013-02-04 15:18:30 -0800133 _DETECTABLE_LABELS)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700134
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -0800135 # Constants used in ping_wait_up() and ping_wait_down().
136 #
137 # _PING_WAIT_COUNT is the approximate number of polling
138 # cycles to use when waiting for a host state change.
139 #
140 # _PING_STATUS_DOWN and _PING_STATUS_UP are names used
141 # for arguments to the internal _ping_wait_for_status()
142 # method.
143 _PING_WAIT_COUNT = 40
144 _PING_STATUS_DOWN = False
145 _PING_STATUS_UP = True
146
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800147 # Allowed values for the power_method argument.
148
149 # POWER_CONTROL_RPM: Passed as default arg for power_off/on/cycle() methods.
150 # POWER_CONTROL_SERVO: Used in set_power() and power_cycle() methods.
151 # POWER_CONTROL_MANUAL: Used in set_power() and power_cycle() methods.
152 POWER_CONTROL_RPM = 'RPM'
153 POWER_CONTROL_SERVO = 'servoj10'
154 POWER_CONTROL_MANUAL = 'manual'
155
156 POWER_CONTROL_VALID_ARGS = (POWER_CONTROL_RPM,
157 POWER_CONTROL_SERVO,
158 POWER_CONTROL_MANUAL)
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800159
Simran Basi5e6339a2013-03-21 11:34:32 -0700160 _RPM_OUTLET_CHANGED = 'outlet_changed'
161
Dan Shi9cb0eec2014-06-03 09:04:50 -0700162 # URL pattern to download firmware image.
Dan Shib8540a52015-07-16 14:18:23 -0700163 _FW_IMAGE_URL_PATTERN = CONFIG.get_config_value(
Dan Shi9cb0eec2014-06-03 09:04:50 -0700164 'CROS', 'firmware_url_pattern', type=str)
beeps687243d2013-07-18 15:29:27 -0700165
MK Ryu35d661e2014-09-25 17:44:10 -0700166 # File that has a list of directories to be collected
167 _LOGS_TO_COLLECT_FILE = os.path.join(
168 common.client_dir, 'common_lib', 'logs_to_collect')
169
170 # Prefix of logging message w.r.t. crash collection
171 _CRASHLOGS_PREFIX = 'collect_crashlogs'
172
173 # Time duration waiting for host up/down check
174 _CHECK_HOST_UP_TIMEOUT_SECS = 15
175
176 # A command that interacts with kernel and hardware (e.g., rm, mkdir, etc)
177 # might not be completely done deep through the hardware when the machine
178 # is powered down right after the command returns.
179 # We should wait for a few seconds to make them done. Finger crossed.
180 _SAFE_WAIT_SECS = 10
181
182
J. Richard Barnette964fba02012-10-24 17:34:29 -0700183 @staticmethod
beeps46dadc92013-11-07 14:07:10 -0800184 def check_host(host, timeout=10):
185 """
186 Check if the given host is a chrome-os host.
187
188 @param host: An ssh host representing a device.
189 @param timeout: The timeout for the run command.
190
191 @return: True if the host device is chromeos.
192
beeps46dadc92013-11-07 14:07:10 -0800193 """
194 try:
Simran Basi933c8af2015-04-29 14:05:07 -0700195 result = host.run(
196 'grep -q CHROMEOS /etc/lsb-release && '
197 '! test -f /mnt/stateful_partition/.android_tester && '
198 '! grep -q moblab /etc/lsb-release',
199 ignore_status=True, timeout=timeout)
beeps46dadc92013-11-07 14:07:10 -0800200 except (error.AutoservRunError, error.AutoservSSHTimeout):
201 return False
202 return result.exit_status == 0
203
204
205 @staticmethod
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800206 def _extract_arguments(args_dict, key_subset):
207 """Extract options from `args_dict` and return a subset result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800208
209 Take the provided dictionary of argument options and return
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800210 a subset that represent standard arguments needed to construct
211 a test-assistant object (chameleon or servo) for a host. The
212 intent is to provide standard argument processing from
Christopher Wiley644ef3e2015-05-15 13:14:14 -0700213 CrosHost for tests that require a test-assistant board
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800214 to operate.
215
216 @param args_dict Dictionary from which to extract the arguments.
217 @param key_subset Tuple of keys to extract from the args_dict, e.g.
218 ('servo_host', 'servo_port').
219 """
220 result = {}
221 for arg in key_subset:
222 if arg in args_dict:
223 result[arg] = args_dict[arg]
224 return result
225
226
227 @staticmethod
228 def get_chameleon_arguments(args_dict):
229 """Extract chameleon options from `args_dict` and return the result.
230
231 Recommended usage:
232 ~~~~~~~~
233 args_dict = utils.args_to_dict(args)
234 chameleon_args = hosts.CrosHost.get_chameleon_arguments(args_dict)
235 host = hosts.create_host(machine, chameleon_args=chameleon_args)
236 ~~~~~~~~
237
238 @param args_dict Dictionary from which to extract the chameleon
239 arguments.
240 """
241 return CrosHost._extract_arguments(
242 args_dict, ('chameleon_host', 'chameleon_port'))
243
244
245 @staticmethod
Scottfe06ed82015-11-05 17:15:01 -0800246 def get_plankton_arguments(args_dict):
247 """Extract chameleon options from `args_dict` and return the result.
248
249 Recommended usage:
250 ~~~~~~~~
251 args_dict = utils.args_to_dict(args)
252 plankon_args = hosts.CrosHost.get_plankton_arguments(args_dict)
253 host = hosts.create_host(machine, plankton_args=polankton_args)
254 ~~~~~~~~
255
256 @param args_dict Dictionary from which to extract the plankton
257 arguments.
258 """
259 args = CrosHost._extract_arguments(
260 args_dict, ('plankton_host', 'plankton_port'))
261 return args
262
263
264 @staticmethod
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800265 def get_servo_arguments(args_dict):
266 """Extract servo options from `args_dict` and return the result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800267
268 Recommended usage:
269 ~~~~~~~~
270 args_dict = utils.args_to_dict(args)
Fang Deng0ca40e22013-08-27 17:47:44 -0700271 servo_args = hosts.CrosHost.get_servo_arguments(args_dict)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800272 host = hosts.create_host(machine, servo_args=servo_args)
273 ~~~~~~~~
274
275 @param args_dict Dictionary from which to extract the servo
276 arguments.
277 """
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800278 return CrosHost._extract_arguments(
279 args_dict, ('servo_host', 'servo_port'))
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700280
J. Richard Barnette964fba02012-10-24 17:34:29 -0700281
Scottfe06ed82015-11-05 17:15:01 -0800282 def _initialize(self, hostname, chameleon_args=None, servo_args=None, plankton_args=None,
Fang Denge545abb2014-12-30 18:43:47 -0800283 try_lab_servo=False, ssh_verbosity_flag='', ssh_options='',
Fang Dengd1c2b732013-08-20 12:59:46 -0700284 *args, **dargs):
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800285 """Initialize superclasses, |self.chameleon|, and |self.servo|.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700286
Fang Denge545abb2014-12-30 18:43:47 -0800287 This method will attempt to create the test-assistant object
288 (chameleon/servo) when it is needed by the test. Check
289 the docstring of chameleon_host.create_chameleon_host and
290 servo_host.create_servo_host for how this is determined.
Fang Deng5d518f42013-08-02 14:04:32 -0700291
Fang Denge545abb2014-12-30 18:43:47 -0800292 @param hostname: Hostname of the dut.
293 @param chameleon_args: A dictionary that contains args for creating
294 a ChameleonHost. See chameleon_host for details.
295 @param servo_args: A dictionary that contains args for creating
296 a ServoHost object. See servo_host for details.
297 @param try_lab_servo: Boolean, False indicates that ServoHost should
298 not be created for a device in Cros test lab.
299 See servo_host for details.
300 @param ssh_verbosity_flag: String, to pass to the ssh command to control
301 verbosity.
302 @param ssh_options: String, other ssh options to pass to the ssh
303 command.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700304 """
Fang Deng0ca40e22013-08-27 17:47:44 -0700305 super(CrosHost, self)._initialize(hostname=hostname,
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700306 *args, **dargs)
J. Richard Barnettef0859852012-08-20 14:55:50 -0700307 # self.env is a dictionary of environment variable settings
308 # to be exported for commands run on the host.
309 # LIBC_FATAL_STDERR_ can be useful for diagnosing certain
310 # errors that might happen.
311 self.env['LIBC_FATAL_STDERR_'] = '1'
Fang Dengd1c2b732013-08-20 12:59:46 -0700312 self._ssh_verbosity_flag = ssh_verbosity_flag
Aviv Keshetc5947fa2013-09-04 14:06:29 -0700313 self._ssh_options = ssh_options
Fang Deng5d518f42013-08-02 14:04:32 -0700314 # TODO(fdeng): We need to simplify the
315 # process of servo and servo_host initialization.
316 # crbug.com/298432
Fang Denge545abb2014-12-30 18:43:47 -0800317 self._servo_host = servo_host.create_servo_host(
318 dut=self.hostname, servo_args=servo_args,
319 try_lab_servo=try_lab_servo)
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800320 # TODO(waihong): Do the simplication on Chameleon too.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800321 self._chameleon_host = chameleon_host.create_chameleon_host(
322 dut=self.hostname, chameleon_args=chameleon_args)
Scottfe06ed82015-11-05 17:15:01 -0800323 # Add plankton host if plankton args were added on command line
324 self._plankton_host = plankton_host.create_plankton_host(plankton_args)
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800325
Dan Shi4d478522014-02-14 13:46:32 -0800326 if self._servo_host is not None:
327 self.servo = self._servo_host.get_servo()
328 else:
329 self.servo = None
330
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800331 if self._chameleon_host:
Tom Wai-Hong Tameaee3402014-01-22 08:52:10 +0800332 self.chameleon = self._chameleon_host.create_chameleon_board()
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800333 else:
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800334 self.chameleon = None
Fang Deng5d518f42013-08-02 14:04:32 -0700335
Scottfe06ed82015-11-05 17:15:01 -0800336 if self._plankton_host:
337 self.plankton_servo = self._plankton_host.get_servo()
338 logging.info('plankton_servo: %r', self.plankton_servo)
339 # Create the plankton object used to access the ec uart
Scott07a848f2016-01-12 15:04:52 -0800340 self.plankton = plankton.Plankton(self.plankton_servo,
341 self._plankton_host.get_servod_server_proxy())
Scottfe06ed82015-11-05 17:15:01 -0800342 else:
Scott07a848f2016-01-12 15:04:52 -0800343 self.plankton = None
Scottfe06ed82015-11-05 17:15:01 -0800344
Fang Deng5d518f42013-08-02 14:04:32 -0700345
Dan Shi3d7a0e12015-10-12 11:55:45 -0700346 def get_repair_image_name(self, image_type='cros'):
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500347 """Generate a image_name from variables in the global config.
348
Dan Shi3d7a0e12015-10-12 11:55:45 -0700349 image_type is used to differentiate different images. Default is CrOS,
350 in which case, repair image's name follows the naming convention defined
351 in global setting CROS/stable_build_pattern.
352 If the image_type is not `cros`, the repair image will be looked up
353 using key `board_name/image_type`, e.g., daisy_spring/firmware.
354
355 @param image_type: Type of the image. Default is `cros`.
356
Dan Shi08173202015-11-12 13:08:45 -0800357 @returns a str of $board-version/$BUILD. Returns None if stable version
358 for the board and the default are both not set, e.g., stable
359 firmware version for a new board.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500360
361 """
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500362 board = self._get_board_from_afe()
363 if board is None:
364 raise error.AutoservError('DUT has no board attribute, '
365 'cannot be repaired.')
Dan Shi3d7a0e12015-10-12 11:55:45 -0700366 if image_type != 'cros':
367 board = '%s/%s' % (board, image_type)
Simran Basibeb2bb22016-02-03 15:25:48 -0800368 stable_version = afe_utils.get_stable_version(board=board)
Dan Shi3d7a0e12015-10-12 11:55:45 -0700369 if image_type == 'cros':
370 build_pattern = CONFIG.get_config_value(
371 'CROS', 'stable_build_pattern')
372 stable_version = build_pattern % (board, stable_version)
Dan Shi08173202015-11-12 13:08:45 -0800373 elif image_type == 'firmware':
374 # If firmware stable version is not specified, `stable_version`
375 # from the RPC is the default stable version for CrOS image.
376 # firmware stable version must be from firmware branch, thus its
377 # value must be like board-firmware/R31-1234.0.0. Check if
378 # firmware exists in the stable version, if not, return None.
379 if 'firmware' not in stable_version:
380 return None
Dan Shi3d7a0e12015-10-12 11:55:45 -0700381 return stable_version
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500382
383
Chris Sosab76e0ee2013-05-22 16:55:41 -0700384 def lookup_job_repo_url(self):
385 """Looks up the job_repo_url for the host.
386
Dan Shi8190eb82016-02-11 17:15:58 -0800387 This is kept for backwards compatibility as AU test code in older
388 branch does not use server-side packaging and calls this method through
389 the host object.
390
391 TODO(dshi): Once R50 falls off the stable branch, we should remove this
392 method.
393
Chris Sosab76e0ee2013-05-22 16:55:41 -0700394 @returns job_repo_url from AFE or None if not found.
395
396 @raises KeyError if the host does not have a job_repo_url
397 """
Dan Shibe3636a2016-02-14 22:48:01 -0800398 return afe_utils.get_host_attribute(self, ds_constants.JOB_REPO_URL)
beepscb6f1e22013-06-28 19:14:10 -0700399
400
beepsdae65fd2013-07-26 16:24:41 -0700401 def verify_job_repo_url(self, tag=''):
beepscb6f1e22013-06-28 19:14:10 -0700402 """
403 Make sure job_repo_url of this host is valid.
404
joychen03eaad92013-06-26 09:55:21 -0700405 Eg: The job_repo_url "http://lmn.cd.ab.xyx:8080/static/\
beepscb6f1e22013-06-28 19:14:10 -0700406 lumpy-release/R29-4279.0.0/autotest/packages" claims to have the
407 autotest package for lumpy-release/R29-4279.0.0. If this isn't the case,
408 download and extract it. If the devserver embedded in the url is
409 unresponsive, update the job_repo_url of the host after staging it on
410 another devserver.
411
412 @param job_repo_url: A url pointing to the devserver where the autotest
413 package for this build should be staged.
beepsdae65fd2013-07-26 16:24:41 -0700414 @param tag: The tag from the server job, in the format
415 <job_id>-<user>/<hostname>, or <hostless> for a server job.
beepscb6f1e22013-06-28 19:14:10 -0700416
417 @raises DevServerException: If we could not resolve a devserver.
418 @raises AutoservError: If we're unable to save the new job_repo_url as
419 a result of choosing a new devserver because the old one failed to
420 respond to a health check.
beeps0c865032013-07-30 11:37:06 -0700421 @raises urllib2.URLError: If the devserver embedded in job_repo_url
422 doesn't respond within the timeout.
beepscb6f1e22013-06-28 19:14:10 -0700423 """
Dan Shibe3636a2016-02-14 22:48:01 -0800424 job_repo_url = afe_utils.get_host_attribute(self,
425 ds_constants.JOB_REPO_URL)
beepscb6f1e22013-06-28 19:14:10 -0700426 if not job_repo_url:
427 logging.warning('No job repo url set on host %s', self.hostname)
428 return
429
430 logging.info('Verifying job repo url %s', job_repo_url)
431 devserver_url, image_name = tools.get_devserver_build_from_package_url(
432 job_repo_url)
433
beeps0c865032013-07-30 11:37:06 -0700434 ds = dev_server.ImageServer(devserver_url)
beepscb6f1e22013-06-28 19:14:10 -0700435
436 logging.info('Staging autotest artifacts for %s on devserver %s',
437 image_name, ds.url())
beeps687243d2013-07-18 15:29:27 -0700438
439 start_time = time.time()
Simran Basi25e7a922014-10-31 11:56:10 -0700440 ds.stage_artifacts(image_name, ['autotest_packages'])
beeps687243d2013-07-18 15:29:27 -0700441 stage_time = time.time() - start_time
442
443 # Record how much of the verification time comes from a devserver
444 # restage. If we're doing things right we should not see multiple
445 # devservers for a given board/build/branch path.
446 try:
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800447 board, build_type, branch = server_utils.ParseBuildName(
beeps687243d2013-07-18 15:29:27 -0700448 image_name)[:3]
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800449 except server_utils.ParseBuildNameException:
beeps687243d2013-07-18 15:29:27 -0700450 pass
451 else:
beeps0c865032013-07-30 11:37:06 -0700452 devserver = devserver_url[
Chris Sosa65425082013-10-16 13:26:22 -0700453 devserver_url.find('/') + 2:devserver_url.rfind(':')]
beeps687243d2013-07-18 15:29:27 -0700454 stats_key = {
455 'board': board,
456 'build_type': build_type,
457 'branch': branch,
beeps0c865032013-07-30 11:37:06 -0700458 'devserver': devserver.replace('.', '_'),
beeps687243d2013-07-18 15:29:27 -0700459 }
Gabe Black1e1c41b2015-02-04 23:55:15 -0800460 autotest_stats.Gauge('verify_job_repo_url').send(
beeps687243d2013-07-18 15:29:27 -0700461 '%(board)s.%(build_type)s.%(branch)s.%(devserver)s' % stats_key,
462 stage_time)
beepscb6f1e22013-06-28 19:14:10 -0700463
Scott Zawalskieadbf702013-03-14 09:23:06 -0400464
Dan Shicf4d2032015-03-12 15:04:21 -0700465 def stage_server_side_package(self, image=None):
466 """Stage autotest server-side package on devserver.
467
468 @param image: Full path of an OS image to install or a build name.
469
470 @return: A url to the autotest server-side package.
471 """
472 if image:
473 image_name = tools.get_build_from_image(image)
474 if not image_name:
475 raise error.AutoservError(
476 'Failed to parse build name from %s' % image)
477 ds = dev_server.ImageServer.resolve(image_name)
478 else:
Dan Shibe3636a2016-02-14 22:48:01 -0800479 job_repo_url = afe_utils.get_host_attribute(
480 self, ds_constants.JOB_REPO_URL)
Dan Shicf4d2032015-03-12 15:04:21 -0700481 if job_repo_url:
482 devserver_url, image_name = (
483 tools.get_devserver_build_from_package_url(job_repo_url))
484 ds = dev_server.ImageServer(devserver_url)
485 else:
486 labels = self._AFE.get_labels(
487 name__startswith=ds_constants.VERSION_PREFIX,
488 host__hostname=self.hostname)
489 if not labels:
490 raise error.AutoservError(
491 'Failed to stage server-side package. The host has '
492 'no job_report_url attribute or version label.')
493 image_name = labels[0].name[len(ds_constants.VERSION_PREFIX):]
494 ds = dev_server.ImageServer.resolve(image_name)
Dan Shica503482015-03-30 17:23:25 -0700495
496 # Get the OS version of the build, for any build older than
497 # MIN_VERSION_SUPPORT_SSP, server side packaging is not supported.
498 match = re.match('.*/R\d+-(\d+)\.', image_name)
499 if match and int(match.group(1)) < self.MIN_VERSION_SUPPORT_SSP:
500 logging.warn('Build %s is older than %s. Server side packaging is '
501 'disabled.', image_name, self.MIN_VERSION_SUPPORT_SSP)
502 return None
503
Dan Shicf4d2032015-03-12 15:04:21 -0700504 ds.stage_artifacts(image_name, ['autotest_server_package'])
505 return '%s/static/%s/%s' % (ds.url(), image_name,
506 'autotest_server_package.tar.bz2')
507
508
Dan Shi0f466e82013-02-22 15:44:58 -0800509 def _try_stateful_update(self, update_url, force_update, updater):
510 """Try to use stateful update to initialize DUT.
511
512 When DUT is already running the same version that machine_install
513 tries to install, stateful update is a much faster way to clean up
514 the DUT for testing, compared to a full reimage. It is implemeted
515 by calling autoupdater.run_update, but skipping updating root, as
516 updating the kernel is time consuming and not necessary.
517
518 @param update_url: url of the image.
519 @param force_update: Set to True to update the image even if the DUT
520 is running the same version.
521 @param updater: ChromiumOSUpdater instance used to update the DUT.
522 @returns: True if the DUT was updated with stateful update.
523
524 """
Dan Shi10b98482016-02-02 14:38:50 -0800525 # Stop service ap-update-manager to prevent rebooting during autoupdate.
526 # The service is used in jetstream boards, but not other CrOS devices.
527 self.run('sudo stop ap-update-manager', ignore_status=True)
528
J. Richard Barnette3f731032014-04-07 17:42:59 -0700529 # TODO(jrbarnette): Yes, I hate this re.match() test case.
530 # It's better than the alternative: see crbug.com/360944.
531 image_name = autoupdater.url_to_image_name(update_url)
532 release_pattern = r'^.*-release/R[0-9]+-[0-9]+\.[0-9]+\.0$'
533 if not re.match(release_pattern, image_name):
534 return False
Dan Shi0f466e82013-02-22 15:44:58 -0800535 if not updater.check_version():
536 return False
537 if not force_update:
538 logging.info('Canceling stateful update because the new and '
539 'old versions are the same.')
540 return False
541 # Following folders should be rebuilt after stateful update.
542 # A test file is used to confirm each folder gets rebuilt after
543 # the stateful update.
544 folders_to_check = ['/var', '/home', '/mnt/stateful_partition']
545 test_file = '.test_file_to_be_deleted'
546 for folder in folders_to_check:
547 touch_path = os.path.join(folder, test_file)
548 self.run('touch %s' % touch_path)
549
Chris Sosae92399e2015-04-24 11:32:59 -0700550 updater.run_update(update_root=False)
Dan Shi0f466e82013-02-22 15:44:58 -0800551
552 # Reboot to complete stateful update.
Chris Sosab76e0ee2013-05-22 16:55:41 -0700553 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
Dan Shi0f466e82013-02-22 15:44:58 -0800554 check_file_cmd = 'test -f %s; echo $?'
555 for folder in folders_to_check:
556 test_file_path = os.path.join(folder, test_file)
557 result = self.run(check_file_cmd % test_file_path,
558 ignore_status=True)
559 if result.exit_status == 1:
560 return False
561 return True
562
563
J. Richard Barnette7275b612013-06-04 18:13:11 -0700564 def _post_update_processing(self, updater, expected_kernel=None):
Dan Shi0f466e82013-02-22 15:44:58 -0800565 """After the DUT is updated, confirm machine_install succeeded.
566
567 @param updater: ChromiumOSUpdater instance used to update the DUT.
J. Richard Barnette7275b612013-06-04 18:13:11 -0700568 @param expected_kernel: kernel expected to be active after reboot,
569 or `None` to skip rollback checking.
Dan Shi0f466e82013-02-22 15:44:58 -0800570
571 """
J. Richard Barnette7275b612013-06-04 18:13:11 -0700572 # Touch the lab machine file to leave a marker that
573 # distinguishes this image from other test images.
574 # Afterwards, we must re-run the autoreboot script because
575 # it depends on the _LAB_MACHINE_FILE.
J. Richard Barnette71cc1862015-12-02 10:32:38 -0800576 autoreboot_cmd = ('FILE="%s" ; [ -f "$FILE" ] || '
577 '( touch "$FILE" ; start autoreboot )')
578 self.run(autoreboot_cmd % self._LAB_MACHINE_FILE)
Chris Sosa65425082013-10-16 13:26:22 -0700579 updater.verify_boot_expectations(
580 expected_kernel, rollback_message=
Gilad Arnoldc26ae1f2015-10-22 16:09:41 -0700581 'Build %s failed to boot on %s; system rolled back to previous '
Chris Sosa65425082013-10-16 13:26:22 -0700582 'build' % (updater.update_version, self.hostname))
J. Richard Barnette7275b612013-06-04 18:13:11 -0700583 # Check that we've got the build we meant to install.
584 if not updater.check_version_to_confirm_install():
585 raise autoupdater.ChromiumOSError(
586 'Failed to update %s to build %s; found build '
587 '%s instead' % (self.hostname,
Chris Sosa65425082013-10-16 13:26:22 -0700588 updater.update_version,
Dan Shi0942b1d2015-03-31 11:07:00 -0700589 self.get_release_version()))
Dan Shi0f466e82013-02-22 15:44:58 -0800590
Chris Sosae92399e2015-04-24 11:32:59 -0700591 logging.debug('Cleaning up old autotest directories.')
592 try:
593 installed_autodir = autotest.Autotest.get_installed_autodir(self)
594 self.run('rm -rf ' + installed_autodir)
595 except autotest.AutodirNotFoundError:
596 logging.debug('No autotest installed directory found.')
597
Dan Shi0f466e82013-02-22 15:44:58 -0800598
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700599 def _stage_image_for_update(self, image_name=None):
Chris Sosae92399e2015-04-24 11:32:59 -0700600 """Stage a build on a devserver and return the update_url and devserver.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400601
602 @param image_name: a name like lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700603 @returns a tuple with an update URL like:
Scott Zawalskieadbf702013-03-14 09:23:06 -0400604 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700605 and the devserver instance.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400606 """
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700607 if not image_name:
608 image_name = self.get_repair_image_name()
Chris Sosae92399e2015-04-24 11:32:59 -0700609
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700610 logging.info('Staging build for AU: %s', image_name)
Dan Shi216389c2015-12-22 11:03:06 -0800611 devserver = dev_server.ImageServer.resolve(image_name, self.hostname)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400612 devserver.trigger_download(image_name, synchronous=False)
Chris Sosae92399e2015-04-24 11:32:59 -0700613 return (tools.image_url_pattern() % (devserver.url(), image_name),
614 devserver)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400615
616
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700617 def stage_image_for_servo(self, image_name=None):
618 """Stage a build on a devserver and return the update_url.
619
620 @param image_name: a name like lumpy-release/R27-3837.0.0
621 @returns an update URL like:
622 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
623 """
624 if not image_name:
625 image_name = self.get_repair_image_name()
626 logging.info('Staging build for servo install: %s', image_name)
Dan Shi216389c2015-12-22 11:03:06 -0800627 devserver = dev_server.ImageServer.resolve(image_name, self.hostname)
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700628 devserver.stage_artifacts(image_name, ['test_image'])
629 return devserver.get_test_image_url(image_name)
630
631
beepse539be02013-07-31 21:57:39 -0700632 def stage_factory_image_for_servo(self, image_name):
633 """Stage a build on a devserver and return the update_url.
634
635 @param image_name: a name like <baord>/4262.204.0
beeps12c0a3c2013-09-03 11:58:27 -0700636
beepse539be02013-07-31 21:57:39 -0700637 @return: An update URL, eg:
638 http://<devserver>/static/canary-channel/\
639 <board>/4262.204.0/factory_test/chromiumos_factory_image.bin
beeps12c0a3c2013-09-03 11:58:27 -0700640
641 @raises: ValueError if the factory artifact name is missing from
642 the config.
643
beepse539be02013-07-31 21:57:39 -0700644 """
645 if not image_name:
646 logging.error('Need an image_name to stage a factory image.')
647 return
648
Dan Shib8540a52015-07-16 14:18:23 -0700649 factory_artifact = CONFIG.get_config_value(
beeps12c0a3c2013-09-03 11:58:27 -0700650 'CROS', 'factory_artifact', type=str, default='')
651 if not factory_artifact:
652 raise ValueError('Cannot retrieve the factory artifact name from '
653 'autotest config, and hence cannot stage factory '
654 'artifacts.')
655
beepse539be02013-07-31 21:57:39 -0700656 logging.info('Staging build for servo install: %s', image_name)
Dan Shi216389c2015-12-22 11:03:06 -0800657 devserver = dev_server.ImageServer.resolve(image_name, self.hostname)
beepse539be02013-07-31 21:57:39 -0700658 devserver.stage_artifacts(
659 image_name,
beeps12c0a3c2013-09-03 11:58:27 -0700660 [factory_artifact],
661 archive_url=None)
beepse539be02013-07-31 21:57:39 -0700662
663 return tools.factory_image_url_pattern() % (devserver.url(), image_name)
664
665
Chris Sosaa3ac2152012-05-23 22:23:13 -0700666 def machine_install(self, update_url=None, force_update=False,
Richard Barnette0b023a72015-04-24 16:07:30 +0000667 local_devserver=False, repair=False,
668 force_full_update=False):
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500669 """Install the DUT.
670
Dan Shi0f466e82013-02-22 15:44:58 -0800671 Use stateful update if the DUT is already running the same build.
672 Stateful update does not update kernel and tends to run much faster
673 than a full reimage. If the DUT is running a different build, or it
674 failed to do a stateful update, full update, including kernel update,
675 will be applied to the DUT.
676
Simran Basi5ace6f22016-01-06 17:30:44 -0800677 Once a host enters machine_install its host attribute job_repo_url
678 (used for package install) will be removed and then updated.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400679
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500680 @param update_url: The url to use for the update
681 pattern: http://$devserver:###/update/$build
682 If update_url is None and repair is True we will install the
Dan Shi6964fa52014-12-18 11:04:27 -0800683 stable image listed in afe_stable_versions table. If the table
684 is not setup, global_config value under CROS.stable_cros_version
685 will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500686 @param force_update: Force an update even if the version installed
687 is the same. Default:False
Christopher Wiley6a4ff932015-05-15 14:00:47 -0700688 @param local_devserver: Used by test_that to allow people to
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500689 use their local devserver. Default: False
Chris Sosae92399e2015-04-24 11:32:59 -0700690 @param repair: Forces update to repair image. Implies force_update.
Fang Deng3d3b9272014-12-22 12:20:28 -0800691 @param force_full_update: If True, do not attempt to run stateful
692 update, force a full reimage. If False, try stateful update
693 first when the dut is already installed with the same version.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500694 @raises autoupdater.ChromiumOSError
695
Dan Shibe3636a2016-02-14 22:48:01 -0800696 @returns A tuple of (image_name, host_attributes).
697 image_name is the name of image installed, e.g.,
698 veyron_jerry-release/R50-7871.0.0
699 host_attributes is a dictionary of (attribute, value), which
700 can be saved to afe_host_attributes table in database. This
701 method returns a dictionary with a single entry of
702 `job_repo_url`: repo_url, where repo_url is a devserver url to
703 autotest packages.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500704 """
Chris Sosae92399e2015-04-24 11:32:59 -0700705 devserver = None
Richard Barnette0b023a72015-04-24 16:07:30 +0000706 if repair:
Chris Sosae92399e2015-04-24 11:32:59 -0700707 update_url, devserver = self._stage_image_for_update()
Richard Barnette0b023a72015-04-24 16:07:30 +0000708 force_update = True
Dan Shi0f466e82013-02-22 15:44:58 -0800709
Chris Sosae92399e2015-04-24 11:32:59 -0700710 if not update_url and not self._parser.options.image:
711 raise error.AutoservError(
Dan Shid07ee2e2015-09-24 14:49:25 -0700712 'There is no update URL, nor a method to get one.')
Chris Sosae92399e2015-04-24 11:32:59 -0700713
714 if not update_url and self._parser.options.image:
715 # This is the base case where we have no given update URL i.e.
716 # dynamic suites logic etc. This is the most flexible case where we
717 # can serve an update from any of our fleet of devservers.
718 requested_build = self._parser.options.image
719 if not requested_build.startswith('http://'):
720 logging.debug('Update will be staged for this installation')
721 update_url, devserver = self._stage_image_for_update(
Dan Shid07ee2e2015-09-24 14:49:25 -0700722 requested_build)
Chris Sosae92399e2015-04-24 11:32:59 -0700723 else:
724 update_url = requested_build
725
726 logging.debug('Update URL is %s', update_url)
727
Dan Shif48f8132016-02-18 10:34:30 -0800728 # Report provision stats.
729 server_name = dev_server.DevServer.get_server_name(update_url)
730 server_name = server_name.replace('.', '_')
731 autotest_stats.Counter('cros_host_provision.' + server_name).increment()
732 autotest_stats.Counter('cros_host_provision.total').increment()
733
Dan Shid07ee2e2015-09-24 14:49:25 -0700734 # Create a file to indicate if provision fails. The file will be removed
735 # by stateful update or full install.
736 self.run('touch %s' % PROVISION_FAILED)
737
Chris Sosae92399e2015-04-24 11:32:59 -0700738 update_complete = False
739 updater = autoupdater.ChromiumOSUpdater(
740 update_url, host=self, local_devserver=local_devserver)
Fang Deng3d3b9272014-12-22 12:20:28 -0800741 if not force_full_update:
742 try:
Chris Sosae92399e2015-04-24 11:32:59 -0700743 # If the DUT is already running the same build, try stateful
744 # update first as it's much quicker than a full re-image.
745 update_complete = self._try_stateful_update(
Dan Shid07ee2e2015-09-24 14:49:25 -0700746 update_url, force_update, updater)
Fang Deng3d3b9272014-12-22 12:20:28 -0800747 except Exception as e:
748 logging.exception(e)
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700749
Dan Shi0f466e82013-02-22 15:44:58 -0800750 inactive_kernel = None
Chris Sosae92399e2015-04-24 11:32:59 -0700751 if update_complete or (not force_update and updater.check_version()):
752 logging.info('Install complete without full update')
753 else:
754 logging.info('DUT requires full update.')
755 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
Dan Shi10b98482016-02-02 14:38:50 -0800756 # Stop service ap-update-manager to prevent rebooting during
757 # autoupdate. The service is used in jetstream boards, but not other
758 # CrOS devices.
759 self.run('sudo stop ap-update-manager', ignore_status=True)
760
Chris Sosae92399e2015-04-24 11:32:59 -0700761 num_of_attempts = provision.FLAKY_DEVSERVER_ATTEMPTS
Chris Sosab7612bc2013-03-21 10:32:37 -0700762
Chris Sosae92399e2015-04-24 11:32:59 -0700763 while num_of_attempts > 0:
764 num_of_attempts -= 1
765 try:
766 updater.run_update()
767 except Exception:
768 logging.warn('Autoupdate did not complete.')
769 # Do additional check for the devserver health. Ideally,
770 # the autoupdater.py could raise an exception when it
771 # detected network flake but that would require
772 # instrumenting the update engine and parsing it log.
773 if (num_of_attempts <= 0 or
774 devserver is None or
775 dev_server.DevServer.devserver_healthy(
776 devserver.url())):
Dan Shid07ee2e2015-09-24 14:49:25 -0700777 raise
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700778
Chris Sosae92399e2015-04-24 11:32:59 -0700779 logging.warn('Devserver looks unhealthy. Trying another')
780 update_url, devserver = self._stage_image_for_update(
781 requested_build)
782 logging.debug('New Update URL is %s', update_url)
783 updater = autoupdater.ChromiumOSUpdater(
784 update_url, host=self,
785 local_devserver=local_devserver)
786 else:
787 break
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700788
Chris Sosae92399e2015-04-24 11:32:59 -0700789 # Give it some time in case of IO issues.
790 time.sleep(10)
Dan Shi5699ac22014-12-19 10:55:49 -0800791
Chris Sosae92399e2015-04-24 11:32:59 -0700792 # Figure out active and inactive kernel.
793 active_kernel, inactive_kernel = updater.get_kernel_state()
Simran Basi13fa1ba2013-03-04 10:56:47 -0800794
Chris Sosae92399e2015-04-24 11:32:59 -0700795 # Ensure inactive kernel has higher priority than active.
796 if (updater.get_kernel_priority(inactive_kernel)
797 < updater.get_kernel_priority(active_kernel)):
798 raise autoupdater.ChromiumOSError(
799 'Update failed. The priority of the inactive kernel'
800 ' partition is less than that of the active kernel'
801 ' partition.')
802
803 # Updater has returned successfully; reboot the host.
804 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
805
806 self._post_update_processing(updater, inactive_kernel)
Simran Basi5ace6f22016-01-06 17:30:44 -0800807 image_name = autoupdater.url_to_image_name(update_url)
Dan Shibe3636a2016-02-14 22:48:01 -0800808
809 # update_url is different from devserver url needed to stage autotest
810 # packages, therefore, resolve a new devserver url here.
811 devserver_url = dev_server.ImageServer.resolve(image_name,
812 self.hostname).url()
813 repo_url = tools.get_package_url(devserver_url, image_name)
814 return image_name, {ds_constants.JOB_REPO_URL: repo_url}
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700815
816
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800817 def _clear_fw_version_labels(self, rw_only):
818 """Clear firmware version labels from the machine.
819
820 @param rw_only: True to only clear fwrw_version; otherewise, clear
821 both fwro_version and fwrw_version.
822 """
Dan Shi9cb0eec2014-06-03 09:04:50 -0700823 labels = self._AFE.get_labels(
Dan Shi0723bf52015-06-24 10:52:38 -0700824 name__startswith=provision.FW_RW_VERSION_PREFIX,
Dan Shi9cb0eec2014-06-03 09:04:50 -0700825 host__hostname=self.hostname)
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800826 if not rw_only:
827 labels = labels + self._AFE.get_labels(
828 name__startswith=provision.FW_RO_VERSION_PREFIX,
829 host__hostname=self.hostname)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700830 for label in labels:
831 label.remove_hosts(hosts=[self.hostname])
832
833
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800834 def _add_fw_version_label(self, build, rw_only):
Dan Shi9cb0eec2014-06-03 09:04:50 -0700835 """Add firmware version label to the machine.
836
837 @param build: Build of firmware.
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800838 @param rw_only: True to only add fwrw_version; otherwise, add both
839 fwro_version and fwrw_version.
Dan Shi9cb0eec2014-06-03 09:04:50 -0700840
841 """
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800842 fw_label = provision.fwrw_version_to_label(build)
MK Ryu73be9862015-07-06 12:25:00 -0700843 self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname])
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800844 if not rw_only:
845 fw_label = provision.fwro_version_to_label(build)
846 self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname])
Dan Shi9cb0eec2014-06-03 09:04:50 -0700847
848
Tom Wai-Hong Tam4ac78982016-01-08 02:34:37 +0800849 def firmware_install(self, build=None, rw_only=False):
Dan Shi9cb0eec2014-06-03 09:04:50 -0700850 """Install firmware to the DUT.
851
852 Use stateful update if the DUT is already running the same build.
853 Stateful update does not update kernel and tends to run much faster
854 than a full reimage. If the DUT is running a different build, or it
855 failed to do a stateful update, full update, including kernel update,
856 will be applied to the DUT.
857
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800858 Once a host enters firmware_install its fw[ro|rw]_version label will
859 be removed. After the firmware is updated successfully, a new
860 fw[ro|rw]_version label will be added to the host.
Dan Shi9cb0eec2014-06-03 09:04:50 -0700861
862 @param build: The build version to which we want to provision the
863 firmware of the machine,
864 e.g. 'link-firmware/R22-2695.1.144'.
Tom Wai-Hong Tam4ac78982016-01-08 02:34:37 +0800865 @param rw_only: True to only install firmware to its RW portions. Keep
866 the RO portions unchanged.
Dan Shi9cb0eec2014-06-03 09:04:50 -0700867
868 TODO(dshi): After bug 381718 is fixed, update here with corresponding
869 exceptions that could be raised.
870
871 """
872 if not self.servo:
873 raise error.TestError('Host %s does not have servo.' %
874 self.hostname)
875
876 # TODO(fdeng): use host.get_board() after
877 # crbug.com/271834 is fixed.
878 board = self._get_board_from_afe()
879
Chris Sosae92399e2015-04-24 11:32:59 -0700880 # If build is not set, try to install firmware from stable CrOS.
Dan Shi9cb0eec2014-06-03 09:04:50 -0700881 if not build:
Dan Shi3d7a0e12015-10-12 11:55:45 -0700882 build = self.get_repair_image_name(image_type='firmware')
883 if not build:
884 raise error.TestError(
885 'Failed to find stable firmware build for %s.',
886 self.hostname)
887 logging.info('Will install firmware from build %s.', build)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700888
889 config = FAFTConfig(board)
890 if config.use_u_boot:
891 ap_image = 'image-%s.bin' % board
892 else: # Depthcharge platform
893 ap_image = 'image.bin'
894 ec_image = 'ec.bin'
Dan Shi216389c2015-12-22 11:03:06 -0800895 ds = dev_server.ImageServer.resolve(build, self.hostname)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700896 ds.stage_artifacts(build, ['firmware'])
897
898 tmpd = autotemp.tempdir(unique_id='fwimage')
899 try:
900 fwurl = self._FW_IMAGE_URL_PATTERN % (ds.url(), build)
901 local_tarball = os.path.join(tmpd.name, os.path.basename(fwurl))
902 server_utils.system('wget -O %s %s' % (local_tarball, fwurl),
903 timeout=60)
904 server_utils.system('tar xf %s -C %s %s %s' %
905 (local_tarball, tmpd.name, ap_image, ec_image),
906 timeout=60)
907 server_utils.system('tar xf %s --wildcards -C %s "dts/*"' %
908 (local_tarball, tmpd.name),
909 timeout=60, ignore_status=True)
910
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800911 self._clear_fw_version_labels(rw_only)
Tom Wai-Hong Tam4ac78982016-01-08 02:34:37 +0800912 logging.info('Will re-program EC %snow', 'RW ' if rw_only else '')
913 self.servo.program_ec(os.path.join(tmpd.name, ec_image), rw_only)
914 logging.info('Will re-program BIOS %snow', 'RW ' if rw_only else '')
915 self.servo.program_bios(os.path.join(tmpd.name, ap_image), rw_only)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700916 self.servo.get_power_state_controller().reset()
917 time.sleep(self.servo.BOOT_DELAY)
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800918 self._add_fw_version_label(build, rw_only)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700919 finally:
920 tmpd.clean()
921
922
Dan Shi10e992b2013-08-30 11:02:59 -0700923 def show_update_engine_log(self):
924 """Output update engine log."""
MK Ryu35d661e2014-09-25 17:44:10 -0700925 logging.debug('Dumping %s', client_constants.UPDATE_ENGINE_LOG)
926 self.run('cat %s' % client_constants.UPDATE_ENGINE_LOG)
Dan Shi10e992b2013-08-30 11:02:59 -0700927
928
Richard Barnette82c35912012-11-20 10:09:10 -0800929 def _get_board_from_afe(self):
930 """Retrieve this host's board from its labels in the AFE.
931
932 Looks for a host label of the form "board:<board>", and
933 returns the "<board>" part of the label. `None` is returned
934 if there is not a single, unique label matching the pattern.
935
936 @returns board from label, or `None`.
937 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700938 return server_utils.get_board_from_afe(self.hostname, self._AFE)
Simran Basi833814b2013-01-29 13:13:43 -0800939
940
Dan Shib3b6db32016-02-03 14:54:05 -0800941 def get_build(self):
942 """Retrieve the current build for this Host from the AFE.
943
944 Looks through this host's labels in the AFE to determine its build.
945 This method is replaced by afe_utils.get_build. It's kept here to
946 maintain backwards compatibility for test control files in older CrOS
947 builds (R48, R49 etc.) still call host.get_build, e.g.,
948 `provision_AutoUpdate.double`.
949 TODO(sbasi): Once R50 falls into release branch, this method can be
950 removed.
951
952 @returns The current build or None if it could not find it or if there
953 were multiple build labels assigned to this host.
954 """
955 return afe_utils.get_build(self)
956
957
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500958 def _install_repair(self):
Chris Sosae92399e2015-04-24 11:32:59 -0700959 """Attempt to repair this host using the update-engine.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500960
961 If the host is up, try installing the DUT with a stable
Dan Shi6964fa52014-12-18 11:04:27 -0800962 "repair" version of Chrome OS as defined in afe_stable_versions table.
963 If the table is not setup, global_config value under
964 CROS.stable_cros_version will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500965
Scott Zawalski62bacae2013-03-05 10:40:32 -0500966 @raises AutoservRepairMethodNA if the DUT is not reachable.
967 @raises ChromiumOSError if the install failed for some reason.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500968
969 """
970 if not self.is_up():
Scott Zawalski62bacae2013-03-05 10:40:32 -0500971 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500972 logging.info('Attempting to reimage machine to repair image.')
973 try:
Simran Basi5ace6f22016-01-06 17:30:44 -0800974 afe_utils.machine_install_and_update_labels(self, repair=True)
Fang Dengd0672f32013-03-18 17:18:09 -0700975 except autoupdater.ChromiumOSError as e:
976 logging.exception(e)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500977 logging.info('Repair via install failed.')
Scott Zawalski62bacae2013-03-05 10:40:32 -0500978 raise
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500979
980
Dan Shi2c88eed2013-11-12 10:18:38 -0800981 def _install_repair_with_powerwash(self):
Dan Shi9cc48452013-11-12 12:39:26 -0800982 """Attempt to powerwash first then repair this host using update-engine.
Dan Shi2c88eed2013-11-12 10:18:38 -0800983
Dan Shi9cc48452013-11-12 12:39:26 -0800984 update-engine may fail due to a bad image. In such case, powerwash
985 may help to cleanup the DUT for update-engine to work again.
Dan Shi2c88eed2013-11-12 10:18:38 -0800986
987 @raises AutoservRepairMethodNA if the DUT is not reachable.
988 @raises ChromiumOSError if the install failed for some reason.
989
990 """
991 if not self.is_up():
992 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
993
994 logging.info('Attempting to powerwash the DUT.')
995 self.run('echo "fast safe" > '
996 '/mnt/stateful_partition/factory_install_reset')
997 self.reboot(timeout=self.POWERWASH_BOOT_TIMEOUT, wait=True)
998 if not self.is_up():
Dan Shi9cc48452013-11-12 12:39:26 -0800999 logging.error('Powerwash failed. DUT did not come back after '
Dan Shi2c88eed2013-11-12 10:18:38 -08001000 'reboot.')
1001 raise error.AutoservRepairFailure(
1002 'DUT failed to boot from powerwash after %d seconds' %
1003 self.POWERWASH_BOOT_TIMEOUT)
1004
1005 logging.info('Powerwash succeeded.')
1006 self._install_repair()
1007
1008
beepsf079cfb2013-09-18 17:49:51 -07001009 def servo_install(self, image_url=None, usb_boot_timeout=USB_BOOT_TIMEOUT,
1010 install_timeout=INSTALL_TIMEOUT):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001011 """
1012 Re-install the OS on the DUT by:
1013 1) installing a test image on a USB storage device attached to the Servo
1014 board,
Richard Barnette03a0c132012-11-05 12:40:35 -08001015 2) booting that image in recovery mode, and then
J. Richard Barnette31b2e312013-04-04 16:05:22 -07001016 3) installing the image with chromeos-install.
1017
Scott Zawalski62bacae2013-03-05 10:40:32 -05001018 @param image_url: If specified use as the url to install on the DUT.
1019 otherwise boot the currently staged image on the USB stick.
beepsf079cfb2013-09-18 17:49:51 -07001020 @param usb_boot_timeout: The usb_boot_timeout to use during reimage.
1021 Factory images need a longer usb_boot_timeout than regular
1022 cros images.
1023 @param install_timeout: The timeout to use when installing the chromeos
1024 image. Factory images need a longer install_timeout.
Richard Barnette03a0c132012-11-05 12:40:35 -08001025
Scott Zawalski62bacae2013-03-05 10:40:32 -05001026 @raises AutoservError if the image fails to boot.
beepsf079cfb2013-09-18 17:49:51 -07001027
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001028 """
beepsf079cfb2013-09-18 17:49:51 -07001029 usb_boot_timer_key = ('servo_install.usb_boot_timeout_%s'
1030 % usb_boot_timeout)
1031 logging.info('Downloading image to USB, then booting from it. Usb boot '
1032 'timeout = %s', usb_boot_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001033 timer = autotest_stats.Timer(usb_boot_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001034 timer.start()
J. Richard Barnette31b2e312013-04-04 16:05:22 -07001035 self.servo.install_recovery_image(image_url)
beepsf079cfb2013-09-18 17:49:51 -07001036 if not self.wait_up(timeout=usb_boot_timeout):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001037 raise error.AutoservRepairFailure(
1038 'DUT failed to boot from USB after %d seconds' %
beepsf079cfb2013-09-18 17:49:51 -07001039 usb_boot_timeout)
1040 timer.stop()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001041
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001042 # The new chromeos-tpm-recovery has been merged since R44-7073.0.0.
1043 # In old CrOS images, this command fails. Skip the error.
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001044 logging.info('Resetting the TPM status')
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001045 try:
1046 self.run('chromeos-tpm-recovery')
1047 except error.AutoservRunError:
1048 logging.warn('chromeos-tpm-recovery is too old.')
1049
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001050
beepsf079cfb2013-09-18 17:49:51 -07001051 install_timer_key = ('servo_install.install_timeout_%s'
1052 % install_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001053 timer = autotest_stats.Timer(install_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001054 timer.start()
1055 logging.info('Installing image through chromeos-install.')
J. Richard Barnette9af19632015-09-25 12:18:03 -07001056 self.run('chromeos-install --yes', timeout=install_timeout)
1057 self.halt()
beepsf079cfb2013-09-18 17:49:51 -07001058 timer.stop()
1059
1060 logging.info('Power cycling DUT through servo.')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001061 self.servo.get_power_state_controller().power_off()
Fang Dengafb88142013-05-30 17:44:31 -07001062 self.servo.switch_usbkey('off')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001063 # N.B. The Servo API requires that we use power_on() here
1064 # for two reasons:
1065 # 1) After turning on a DUT in recovery mode, you must turn
1066 # it off and then on with power_on() once more to
1067 # disable recovery mode (this is a Parrot specific
1068 # requirement).
1069 # 2) After power_off(), the only way to turn on is with
1070 # power_on() (this is a Storm specific requirement).
J. Richard Barnettefbcc7122013-07-24 18:24:59 -07001071 self.servo.get_power_state_controller().power_on()
beepsf079cfb2013-09-18 17:49:51 -07001072
1073 logging.info('Waiting for DUT to come back up.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001074 if not self.wait_up(timeout=self.BOOT_TIMEOUT):
1075 raise error.AutoservError('DUT failed to reboot installed '
1076 'test image after %d seconds' %
Scott Zawalski62bacae2013-03-05 10:40:32 -05001077 self.BOOT_TIMEOUT)
1078
1079
Dan Shic1b8bdd2015-09-14 23:11:24 -07001080 def _setup_servo(self):
1081 """Try to force to create servo object if it's not set up yet.
1082 """
1083 if self.servo:
1084 return
1085
1086 try:
1087 # Setting servo_args to {} will force it to create the servo_host
1088 # object if possible.
1089 self._servo_host = servo_host.create_servo_host(
1090 dut=self.hostname, servo_args={})
1091 if self._servo_host:
1092 self.servo = self._servo_host.get_servo()
1093 else:
1094 logging.error('Failed to create servo_host object.')
1095 except Exception as e:
1096 logging.error('Failed to create servo object: %s', e)
1097
1098
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001099 def _servo_repair_reinstall(self):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001100 """Reinstall the DUT utilizing servo and a test image.
1101
1102 Re-install the OS on the DUT by:
1103 1) installing a test image on a USB storage device attached to the Servo
1104 board,
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001105 2) booting that image in recovery mode,
1106 3) resetting the TPM status, and then
1107 4) installing the image with chromeos-install.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001108
Scott Zawalski62bacae2013-03-05 10:40:32 -05001109 @raises AutoservRepairMethodNA if the device does not have servo
1110 support.
1111
1112 """
1113 if not self.servo:
1114 raise error.AutoservRepairMethodNA('Repair Reinstall NA: '
1115 'DUT has no servo support.')
1116
1117 logging.info('Attempting to recovery servo enabled device with '
1118 'servo_repair_reinstall')
1119
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001120 image_url = self.stage_image_for_servo()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001121 self.servo_install(image_url)
1122
1123
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001124 def _is_firmware_repair_supported(self):
1125 """Check if the firmware repair is supported.
Dan Shi3d7a0e12015-10-12 11:55:45 -07001126
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001127 The firmware repair is only applicable to DUTs in pools listed in
1128 global config CROS/pools_support_firmware_repair.
Dan Shi3d7a0e12015-10-12 11:55:45 -07001129
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001130 @return: True if it is supported; otherwise False.
Dan Shi3d7a0e12015-10-12 11:55:45 -07001131 """
1132 logging.info('Checking if host %s can be repaired with firmware '
1133 'repair.', self.hostname)
1134 pools = server_utils.get_labels_from_afe(self.hostname, 'pool:',
1135 self._AFE)
1136 pools_support_firmware_repair = CONFIG.get_config_value('CROS',
1137 'pools_support_firmware_repair', type=str).split(',')
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001138
1139 return (pools and pools_support_firmware_repair and
1140 set(pools).intersection(set(pools_support_firmware_repair)))
1141
1142
1143 def _firmware_repair(self):
1144 """Reinstall the firmware image using servo.
1145
1146 This repair function attempts to install the stable firmware specified
1147 by the stable firmware version.
1148 Then reset the DUT and try to verify it. If verify fails, it will try to
1149 install the CrOS image using servo.
1150 """
1151 if not self._is_firmware_repair_supported():
1152 logging.info('Host is not in pools that support firmware repair.')
Dan Shi3d7a0e12015-10-12 11:55:45 -07001153 raise error.AutoservRepairMethodNA(
1154 'Firmware repair is not applicable to host %s.' %
1155 self.hostname)
1156
1157 # To repair a DUT connected to a moblab, try to create a servo object if
1158 # it was failed to be created earlier as there may be a servo_host host
1159 # attribute for this host.
1160 if utils.is_moblab():
1161 self._setup_servo()
1162
1163 if not self.servo:
1164 raise error.AutoservRepairMethodNA('Repair Reinstall NA: '
1165 'DUT has no servo support.')
1166
1167 logging.info('Attempting to recovery servo enabled device with '
1168 'firmware_repair.')
1169 self.firmware_install()
1170
1171 logging.info('Firmware repaired. Check if the DUT can boot. If not, '
1172 'reinstall the CrOS using servo.')
1173 try:
Dan Shi3d7a0e12015-10-12 11:55:45 -07001174 self.verify()
1175 except Exception as e:
1176 logging.warn('Failed to verify DUT, error: %s. Will try to repair '
1177 'the DUT with servo_repair_reinstall.', e)
1178 self._servo_repair_reinstall()
1179
1180
Scott Zawalski62bacae2013-03-05 10:40:32 -05001181 def _servo_repair_power(self):
1182 """Attempt to repair DUT using an attached Servo.
1183
J. Richard Barnette13165972016-01-13 10:53:09 -08001184 Attempt to power cycle the DUT via cold_reset.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001185
1186 @raises AutoservRepairMethodNA if the device does not have servo
1187 support.
1188 @raises AutoservRepairFailure if the repair fails for any reason.
1189 """
1190 if not self.servo:
1191 raise error.AutoservRepairMethodNA('Repair Power NA: '
1192 'DUT has no servo support.')
1193
1194 logging.info('Attempting to recover servo enabled device by '
J. Richard Barnette13165972016-01-13 10:53:09 -08001195 'powering cycling with cold reset.')
1196 self.servo.get_power_state_controller().reset()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001197 if self.wait_up(self.BOOT_TIMEOUT):
1198 return
1199
1200 raise error.AutoservRepairFailure('DUT did not boot after long_press.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001201
1202
Richard Barnette82c35912012-11-20 10:09:10 -08001203 def _powercycle_to_repair(self):
1204 """Utilize the RPM Infrastructure to bring the host back up.
1205
1206 If the host is not up/repaired after the first powercycle we utilize
1207 auto fallback to the last good install by powercycling and rebooting the
1208 host 6 times.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001209
1210 @raises AutoservRepairMethodNA if the device does not support remote
1211 power.
1212 @raises AutoservRepairFailure if the repair fails for any reason.
1213
Richard Barnette82c35912012-11-20 10:09:10 -08001214 """
Scott Zawalski62bacae2013-03-05 10:40:32 -05001215 if not self.has_power():
1216 raise error.AutoservRepairMethodNA('Device does not support power.')
1217
Richard Barnette82c35912012-11-20 10:09:10 -08001218 logging.info('Attempting repair via RPM powercycle.')
1219 failed_cycles = 0
1220 self.power_cycle()
1221 while not self.wait_up(timeout=self.BOOT_TIMEOUT):
1222 failed_cycles += 1
1223 if failed_cycles >= self._MAX_POWER_CYCLE_ATTEMPTS:
Scott Zawalski62bacae2013-03-05 10:40:32 -05001224 raise error.AutoservRepairFailure(
1225 'Powercycled host %s %d times; device did not come back'
1226 ' online.' % (self.hostname, failed_cycles))
Richard Barnette82c35912012-11-20 10:09:10 -08001227 self.power_cycle()
1228 if failed_cycles == 0:
1229 logging.info('Powercycling was successful first time.')
1230 else:
1231 logging.info('Powercycling was successful after %d failures.',
1232 failed_cycles)
1233
1234
MK Ryu35d661e2014-09-25 17:44:10 -07001235 def _reboot_repair(self):
1236 """SSH to this host and reboot."""
1237 if not self.is_up(self._CHECK_HOST_UP_TIMEOUT_SECS):
1238 raise error.AutoservRepairMethodNA('DUT unreachable for reboot.')
1239 logging.info('Attempting repair via SSH reboot.')
1240 self.reboot(timeout=self.BOOT_TIMEOUT, wait=True)
1241
1242
Prashanth B4d8184f2014-05-05 12:22:02 -07001243 def check_device(self):
1244 """Check if a device is ssh-able, and if so, clean and verify it.
1245
1246 @raise AutoservSSHTimeout: If the ssh ping times out.
1247 @raise AutoservSshPermissionDeniedError: If ssh ping fails due to
1248 permissions.
1249 @raise AutoservSshPingHostError: For other AutoservRunErrors during
1250 ssh_ping.
1251 @raises AutoservError: As appropriate, during cleanup and verify.
1252 """
1253 self.ssh_ping()
1254 self.cleanup()
1255 self.verify()
1256
1257
Dan Shi90466352015-09-22 15:01:05 -07001258 def confirm_servo(self):
1259 """Confirm servo is initialized and verified.
1260
1261 @raise AutoservError: If servo is not initialized and verified.
1262 """
Tom Wai-Hong Tam244acc22016-01-09 07:04:21 +08001263 if self.servo and self._servo_host.required_by_test:
Dan Shi90466352015-09-22 15:01:05 -07001264 return
1265
1266 # Force to re-create the servo object to make sure servo is verified.
1267 logging.debug('Rebuilding the servo object.')
1268 self.servo = None
1269 self._servo_host = None
1270 self._setup_servo()
1271 if not self.servo:
1272 raise error.AutoservError('Failed to create servo object.')
1273
1274
Dan Shid07ee2e2015-09-24 14:49:25 -07001275 def _is_last_provision_failed(self):
1276 """Checks if the last provision job failed.
1277
1278 @return: True if there exists file /var/tmp/provision_failed, which
1279 indicates the last provision job failed.
1280 False if the file does not exist or the dut can't be reached.
1281 """
1282 try:
1283 result = self.run('test -f %s' % PROVISION_FAILED,
1284 ignore_status=True, timeout=5)
1285 return result.exit_status == 0
1286 except (error.AutoservRunError, error.AutoservSSHTimeout):
1287 # Default to False, for repair to try all repair method if the dut
1288 # can't be reached.
1289 return False
1290
1291
J. Richard Barnettec2d99cf2015-11-18 12:46:15 -08001292 def repair(self):
1293 """Attempt to get the DUT to pass `self.verify()`.
Richard Barnette82c35912012-11-20 10:09:10 -08001294
1295 This overrides the base class function for repair; it does
1296 not call back to the parent class, but instead offers a
1297 simplified implementation based on the capabilities in the
1298 Chrome OS test lab.
1299
Fang Deng5d518f42013-08-02 14:04:32 -07001300 It first verifies and repairs servo if it is a DUT in CrOS
Fang Deng03590af2013-10-07 17:34:20 -07001301 lab and a servo is attached.
Fang Deng5d518f42013-08-02 14:04:32 -07001302
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001303 This escalates in order through the following procedures and verifies
1304 the status using `self.check_device()` after each of them. This is done
1305 until both the repair and the veryfing step succeed.
1306
MK Ryu35d661e2014-09-25 17:44:10 -07001307 Escalation order of repair procedures from less intrusive to
1308 more intrusive repairs:
1309 1. SSH to the DUT and reboot.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001310 2. If there's a servo for the DUT, try to power the DUT off and
1311 on.
MK Ryu35d661e2014-09-25 17:44:10 -07001312 3. If the DUT can be power-cycled via RPM, try to repair
Richard Barnette82c35912012-11-20 10:09:10 -08001313 by power-cycling.
MK Ryu35d661e2014-09-25 17:44:10 -07001314 4. Try to re-install to a known stable image using
1315 auto-update.
1316 5. If there's a servo for the DUT, try to re-install via
1317 the servo.
Richard Barnette82c35912012-11-20 10:09:10 -08001318
1319 As with the parent method, the last operation performed on
Prashanth B4d8184f2014-05-05 12:22:02 -07001320 the DUT must be to call `self.check_device()`; If that call fails the
1321 exception it raises is passed back to the caller.
J. Richard Barnettefde55fc2013-03-15 17:47:01 -07001322
Scott Zawalski62bacae2013-03-05 10:40:32 -05001323 @raises AutoservRepairTotalFailure if the repair process fails to
1324 fix the DUT.
Fang Deng5d518f42013-08-02 14:04:32 -07001325 @raises ServoHostRepairTotalFailure if the repair process fails to
1326 fix the servo host if one is attached to the DUT.
1327 @raises AutoservSshPermissionDeniedError if it is unable
1328 to ssh to the servo host due to permission error.
1329
Richard Barnette82c35912012-11-20 10:09:10 -08001330 """
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001331 # Caution: Deleting shards relies on repair to always reboot the DUT.
1332
Nicolas Boichate30c7e12015-11-05 11:12:50 +08001333 # To repair a DUT connected to a moblab, try to create a servo object if
1334 # it was failed to be created earlier as there may be a servo_host host
1335 # attribute for this host.
1336 if utils.is_moblab():
1337 self._setup_servo()
1338
Dan Shi4d478522014-02-14 13:46:32 -08001339 if self._servo_host and not self.servo:
Fang Deng03590af2013-10-07 17:34:20 -07001340 try:
J. Richard Barnette4fc59c42015-12-15 16:58:50 -08001341 self._servo_host.repair()
Fang Deng03590af2013-10-07 17:34:20 -07001342 except Exception as e:
Fang Deng03590af2013-10-07 17:34:20 -07001343 logging.error('Could not create a healthy servo: %s', e)
Dan Shi4d478522014-02-14 13:46:32 -08001344 self.servo = self._servo_host.get_servo()
Fang Deng5d518f42013-08-02 14:04:32 -07001345
MK Ryu35d661e2014-09-25 17:44:10 -07001346 self.try_collect_crashlogs()
1347
Scott Zawalski62bacae2013-03-05 10:40:32 -05001348 # TODO(scottz): This should use something similar to label_decorator,
1349 # but needs to be populated in order so DUTs are repaired with the
1350 # least amount of effort.
Dan Shid07ee2e2015-09-24 14:49:25 -07001351 force_powerwash = self._is_last_provision_failed()
1352 if force_powerwash:
1353 logging.info('Last provision failed, try powerwash first.')
1354 autotest_stats.Counter(
1355 'repair_force_powerwash.TOTAL').increment()
Tom Wai-Hong Tamb284ce42016-01-15 08:11:38 +08001356 repair_funcs = [self._firmware_repair,
1357 self._install_repair_with_powerwash,
1358 self._servo_repair_reinstall]
Dan Shid07ee2e2015-09-24 14:49:25 -07001359 else:
1360 repair_funcs = [self._reboot_repair,
1361 self._servo_repair_power,
Tom Wai-Hong Tamb284ce42016-01-15 08:11:38 +08001362 self._firmware_repair,
Dan Shid07ee2e2015-09-24 14:49:25 -07001363 self._powercycle_to_repair,
1364 self._install_repair,
1365 self._install_repair_with_powerwash,
Tom Wai-Hong Tamb284ce42016-01-15 08:11:38 +08001366 self._servo_repair_reinstall]
Scott Zawalski62bacae2013-03-05 10:40:32 -05001367 errors = []
Simran Basie6130932013-10-01 14:07:52 -07001368 board = self._get_board_from_afe()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001369 for repair_func in repair_funcs:
1370 try:
1371 repair_func()
MK Ryu35d661e2014-09-25 17:44:10 -07001372 self.try_collect_crashlogs()
Prashanth B4d8184f2014-05-05 12:22:02 -07001373 self.check_device()
Gabe Black1e1c41b2015-02-04 23:55:15 -08001374 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001375 '%s.SUCCEEDED' % repair_func.__name__).increment()
1376 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001377 autotest_stats.Counter(
Dan Shid07ee2e2015-09-24 14:49:25 -07001378 '%s.%s.SUCCEEDED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001379 board)).increment()
Dan Shid07ee2e2015-09-24 14:49:25 -07001380 if force_powerwash:
1381 autotest_stats.Counter(
1382 'repair_force_powerwash.SUCCEEDED').increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001383 return
Simran Basie6130932013-10-01 14:07:52 -07001384 except error.AutoservRepairMethodNA as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001385 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001386 '%s.RepairNA' % repair_func.__name__).increment()
1387 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001388 autotest_stats.Counter(
Dan Shid07ee2e2015-09-24 14:49:25 -07001389 '%s.%s.RepairNA' % (repair_func.__name__,
1390 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001391 logging.warning('Repair function NA: %s', e)
Simran Basie6130932013-10-01 14:07:52 -07001392 errors.append(str(e))
Scott Zawalski62bacae2013-03-05 10:40:32 -05001393 except Exception as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001394 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001395 '%s.FAILED' % repair_func.__name__).increment()
1396 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001397 autotest_stats.Counter(
Dan Shid07ee2e2015-09-24 14:49:25 -07001398 '%s.%s.FAILED' % (repair_func.__name__,
1399 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001400 logging.warning('Failed to repair device: %s', e)
Scott Zawalski62bacae2013-03-05 10:40:32 -05001401 errors.append(str(e))
Scott Zawalski89c44dd2013-02-26 09:28:02 -05001402
Dan Shid07ee2e2015-09-24 14:49:25 -07001403 if force_powerwash:
1404 autotest_stats.Counter(
1405 'repair_force_powerwash.FAILED').increment()
Gabe Black1e1c41b2015-02-04 23:55:15 -08001406 autotest_stats.Counter('Full_Repair_Failed').increment()
Simran Basie6130932013-10-01 14:07:52 -07001407 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001408 autotest_stats.Counter(
Dan Shid07ee2e2015-09-24 14:49:25 -07001409 'Full_Repair_Failed.%s' % board).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001410 raise error.AutoservRepairTotalFailure(
1411 'All attempts at repairing the device failed:\n%s' %
1412 '\n'.join(errors))
Richard Barnette82c35912012-11-20 10:09:10 -08001413
1414
MK Ryu35d661e2014-09-25 17:44:10 -07001415 def try_collect_crashlogs(self, check_host_up=True):
1416 """
1417 Check if a host is up and logs need to be collected from the host,
1418 if yes, collect them.
1419
1420 @param check_host_up: Flag for checking host is up. Default is True.
1421 """
1422 try:
1423 crash_job = self._need_crash_logs()
1424 if crash_job:
1425 logging.debug('%s: Job %s was crashed', self._CRASHLOGS_PREFIX,
1426 crash_job)
1427 if not check_host_up or self.is_up(
1428 self._CHECK_HOST_UP_TIMEOUT_SECS):
1429 self._collect_crashlogs(crash_job)
1430 logging.debug('%s: Completed collecting logs for the '
1431 'crashed job %s', self._CRASHLOGS_PREFIX,
1432 crash_job)
1433 except Exception as e:
1434 # Exception should not result in repair failure.
1435 # Therefore, suppress all exceptions here.
1436 logging.error('%s: Failed while trying to collect crash-logs: %s',
1437 self._CRASHLOGS_PREFIX, e)
1438
1439
1440 def _need_crash_logs(self):
1441 """Get the value of need_crash_logs attribute of this host.
1442
1443 @return: Value string of need_crash_logs attribute
1444 None if there is no need_crash_logs attribute
1445 """
1446 attrs = self._AFE.get_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1447 hostname=self.hostname)
1448 assert len(attrs) < 2
1449 return attrs[0].value if attrs else None
1450
1451
1452 def _collect_crashlogs(self, job_id):
1453 """Grab logs from the host where a job was crashed.
1454
1455 First, check if PRIOR_LOGS_DIR exists in the host.
1456 If yes, collect them.
1457 Otherwise, check if a lab-machine marker (_LAB_MACHINE_FILE) exists
1458 in the host.
1459 If yes, the host was repaired automatically, and we collect normal
1460 system logs.
1461
1462 @param job_id: Id of the job that was crashed.
1463 """
1464 crashlogs_dir = crashcollect.get_crashinfo_dir(self,
1465 constants.CRASHLOGS_DEST_DIR_PREFIX)
1466 flag_prior_logs = False
1467
1468 if self.path_exists(client_constants.PRIOR_LOGS_DIR):
1469 flag_prior_logs = True
1470 self._collect_prior_logs(crashlogs_dir)
1471 elif self.path_exists(self._LAB_MACHINE_FILE):
1472 self._collect_system_logs(crashlogs_dir)
1473 else:
1474 logging.warning('%s: Host was manually re-installed without '
1475 '--lab_preserve_log option. Skip collecting '
1476 'crash-logs.', self._CRASHLOGS_PREFIX)
1477
1478 # We make crash collection be one-time effort.
1479 # _collect_prior_logs() and _collect_system_logs() will not throw
1480 # any exception, and following codes will be executed even when
1481 # those methods fail.
1482 # _collect_crashlogs() is called only when the host is up (refer
1483 # to try_collect_crashlogs()). We assume _collect_prior_logs() and
1484 # _collect_system_logs() fail rarely when the host is up.
1485 # In addition, it is not clear how many times we should try crash
1486 # collection again while not triggering next repair unnecessarily.
1487 # Threfore, we try crash collection one time.
1488
1489 # Create a marker file as soon as log collection is done.
1490 # Leave the job id to this marker for gs_offloader to consume.
1491 marker_file = os.path.join(crashlogs_dir, constants.CRASHLOGS_MARKER)
1492 with open(marker_file, 'a') as f:
1493 f.write('%s\n' % job_id)
1494
1495 # Remove need_crash_logs attribute
1496 logging.debug('%s: Remove attribute need_crash_logs from host %s',
1497 self._CRASHLOGS_PREFIX, self.hostname)
1498 self._AFE.set_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1499 None, hostname=self.hostname)
1500
1501 if flag_prior_logs:
1502 logging.debug('%s: Remove %s from host %s', self._CRASHLOGS_PREFIX,
1503 client_constants.PRIOR_LOGS_DIR, self.hostname)
1504 self.run('rm -rf %s; sync' % client_constants.PRIOR_LOGS_DIR)
1505 # Wait for a few seconds to make sure the prior command is
1506 # done deep through storage.
1507 time.sleep(self._SAFE_WAIT_SECS)
1508
1509
1510 def _collect_prior_logs(self, crashlogs_dir):
1511 """Grab prior logs that were stashed before re-installing a host.
1512
1513 @param crashlogs_dir: Directory path where crash-logs are stored.
1514 """
1515 logging.debug('%s: Found %s, collecting them...',
1516 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1517 try:
1518 self.collect_logs(client_constants.PRIOR_LOGS_DIR,
1519 crashlogs_dir, False)
1520 logging.debug('%s: %s is collected',
1521 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1522 except Exception as e:
1523 logging.error('%s: Failed to collect %s: %s',
1524 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR,
1525 e)
1526
1527
1528 def _collect_system_logs(self, crashlogs_dir):
1529 """Grab normal system logs from a host.
1530
1531 @param crashlogs_dir: Directory path where crash-logs are stored.
1532 """
1533 logging.debug('%s: Found %s, collecting system logs...',
1534 self._CRASHLOGS_PREFIX, self._LAB_MACHINE_FILE)
1535 sources = server_utils.parse_simple_config(self._LOGS_TO_COLLECT_FILE)
1536 for src in sources:
1537 try:
1538 if self.path_exists(src):
1539 logging.debug('%s: Collecting %s...',
1540 self._CRASHLOGS_PREFIX, src)
1541 dest = server_utils.concat_path_except_last(
1542 crashlogs_dir, src)
1543 self.collect_logs(src, dest, False)
1544 logging.debug('%s: %s is collected',
1545 self._CRASHLOGS_PREFIX, src)
1546 except Exception as e:
1547 logging.error('%s: Failed to collect %s: %s',
1548 self._CRASHLOGS_PREFIX, src, e)
1549
1550
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001551 def close(self):
Fang Deng0ca40e22013-08-27 17:47:44 -07001552 super(CrosHost, self).close()
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001553
1554
Dan Shi49ca0932014-11-14 11:22:27 -08001555 def get_power_supply_info(self):
1556 """Get the output of power_supply_info.
1557
1558 power_supply_info outputs the info of each power supply, e.g.,
1559 Device: Line Power
1560 online: no
1561 type: Mains
1562 voltage (V): 0
1563 current (A): 0
1564 Device: Battery
1565 state: Discharging
1566 percentage: 95.9276
1567 technology: Li-ion
1568
1569 Above output shows two devices, Line Power and Battery, with details of
1570 each device listed. This function parses the output into a dictionary,
1571 with key being the device name, and value being a dictionary of details
1572 of the device info.
1573
1574 @return: The dictionary of power_supply_info, e.g.,
1575 {'Line Power': {'online': 'yes', 'type': 'main'},
1576 'Battery': {'vendor': 'xyz', 'percentage': '100'}}
Dan Shie9b765d2014-12-29 16:59:49 -08001577 @raise error.AutoservRunError if power_supply_info tool is not found in
1578 the DUT. Caller should handle this error to avoid false failure
1579 on verification.
Dan Shi49ca0932014-11-14 11:22:27 -08001580 """
1581 result = self.run('power_supply_info').stdout.strip()
1582 info = {}
1583 device_name = None
1584 device_info = {}
1585 for line in result.split('\n'):
1586 pair = [v.strip() for v in line.split(':')]
1587 if len(pair) != 2:
1588 continue
1589 if pair[0] == 'Device':
1590 if device_name:
1591 info[device_name] = device_info
1592 device_name = pair[1]
1593 device_info = {}
1594 else:
1595 device_info[pair[0]] = pair[1]
1596 if device_name and not device_name in info:
1597 info[device_name] = device_info
1598 return info
1599
1600
1601 def get_battery_percentage(self):
1602 """Get the battery percentage.
1603
1604 @return: The percentage of battery level, value range from 0-100. Return
1605 None if the battery info cannot be retrieved.
1606 """
1607 try:
1608 info = self.get_power_supply_info()
1609 logging.info(info)
1610 return float(info['Battery']['percentage'])
Dan Shie9b765d2014-12-29 16:59:49 -08001611 except (KeyError, ValueError, error.AutoservRunError):
Dan Shi49ca0932014-11-14 11:22:27 -08001612 return None
1613
1614
1615 def is_ac_connected(self):
1616 """Check if the dut has power adapter connected and charging.
1617
1618 @return: True if power adapter is connected and charging.
1619 """
1620 try:
1621 info = self.get_power_supply_info()
1622 return info['Line Power']['online'] == 'yes'
Dan Shie9b765d2014-12-29 16:59:49 -08001623 except (KeyError, error.AutoservRunError):
1624 return None
Dan Shi49ca0932014-11-14 11:22:27 -08001625
1626
Simran Basi5e6339a2013-03-21 11:34:32 -07001627 def _cleanup_poweron(self):
1628 """Special cleanup method to make sure hosts always get power back."""
1629 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
1630 hosts = afe.get_hosts(hostname=self.hostname)
1631 if not hosts or not (self._RPM_OUTLET_CHANGED in
1632 hosts[0].attributes):
1633 return
1634 logging.debug('This host has recently interacted with the RPM'
1635 ' Infrastructure. Ensuring power is on.')
1636 try:
1637 self.power_on()
Dan Shi7dca56e2014-11-11 17:07:56 -08001638 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1639 hostname=self.hostname)
Simran Basi5e6339a2013-03-21 11:34:32 -07001640 except rpm_client.RemotePowerException:
Simran Basi5e6339a2013-03-21 11:34:32 -07001641 logging.error('Failed to turn Power On for this host after '
1642 'cleanup through the RPM Infrastructure.')
Gabe Blackb72f4fb2015-01-20 16:47:13 -08001643 autotest_es.post(
Dan Shi7dca56e2014-11-11 17:07:56 -08001644 type_str='RPM_poweron_failure',
1645 metadata={'hostname': self.hostname})
Dan Shi49ca0932014-11-14 11:22:27 -08001646
1647 battery_percentage = self.get_battery_percentage()
Dan Shif01ebe22014-12-05 13:10:57 -08001648 if battery_percentage and battery_percentage < 50:
Dan Shi49ca0932014-11-14 11:22:27 -08001649 raise
1650 elif self.is_ac_connected():
1651 logging.info('The device has power adapter connected and '
1652 'charging. No need to try to turn RPM on '
1653 'again.')
1654 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1655 hostname=self.hostname)
1656 logging.info('Battery level is now at %s%%. The device may '
1657 'still have enough power to run test, so no '
1658 'exception will be raised.', battery_percentage)
1659
Simran Basi5e6339a2013-03-21 11:34:32 -07001660
beepsc87ff602013-07-31 21:53:00 -07001661 def _is_factory_image(self):
1662 """Checks if the image on the DUT is a factory image.
1663
1664 @return: True if the image on the DUT is a factory image.
1665 False otherwise.
1666 """
1667 result = self.run('[ -f /root/.factory_test ]', ignore_status=True)
1668 return result.exit_status == 0
1669
1670
1671 def _restart_ui(self):
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001672 """Restart the Chrome UI.
beepsc87ff602013-07-31 21:53:00 -07001673
1674 @raises: FactoryImageCheckerException for factory images, since
1675 we cannot attempt to restart ui on them.
1676 error.AutoservRunError for any other type of error that
1677 occurs while restarting ui.
1678 """
1679 if self._is_factory_image():
Dan Shi549fb822015-03-24 18:01:11 -07001680 raise FactoryImageCheckerException('Cannot restart ui on factory '
1681 'images')
beepsc87ff602013-07-31 21:53:00 -07001682
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001683 # TODO(jrbarnette): The command to stop/start the ui job
1684 # should live inside cros_ui, too. However that would seem
1685 # to imply interface changes to the existing start()/restart()
1686 # functions, which is a bridge too far (for now).
J. Richard Barnette6069aa12015-06-08 09:10:24 -07001687 prompt = cros_ui.get_chrome_session_ident(self)
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001688 self.run('stop ui; start ui')
1689 cros_ui.wait_for_chrome_ready(prompt, self)
beepsc87ff602013-07-31 21:53:00 -07001690
1691
Dan Shi549fb822015-03-24 18:01:11 -07001692 def get_release_version(self):
1693 """Get the value of attribute CHROMEOS_RELEASE_VERSION from lsb-release.
1694
1695 @returns The version string in lsb-release, under attribute
1696 CHROMEOS_RELEASE_VERSION.
1697 """
1698 lsb_release_content = self.run(
1699 'cat "%s"' % client_constants.LSB_RELEASE).stdout.strip()
1700 return lsbrelease_utils.get_chromeos_release_version(
1701 lsb_release_content=lsb_release_content)
1702
1703
1704 def verify_cros_version_label(self):
1705 """ Make sure host's cros-version label match the actual image in dut.
1706
1707 Remove any cros-version: label that doesn't match that installed in
1708 the dut.
1709
1710 @param raise_error: Set to True to raise exception if any mismatch found
1711
1712 @raise error.AutoservError: If any mismatch between cros-version label
1713 and the build installed in dut is found.
1714 """
1715 labels = self._AFE.get_labels(
1716 name__startswith=ds_constants.VERSION_PREFIX,
1717 host__hostname=self.hostname)
1718 mismatch_found = False
1719 if labels:
1720 # Get CHROMEOS_RELEASE_VERSION from lsb-release, e.g., 6908.0.0.
1721 # Note that it's different from cros-version label, which has
1722 # builder and branch info, e.g.,
1723 # cros-version:peppy-release/R43-6908.0.0
1724 release_version = self.get_release_version()
1725 host_list = [self.hostname]
1726 for label in labels:
1727 # Remove any cros-version label that does not match
1728 # release_version.
1729 build_version = label.name[len(ds_constants.VERSION_PREFIX):]
1730 if not utils.version_match(build_version, release_version):
1731 logging.warn('cros-version label "%s" does not match '
1732 'release version %s. Removing the label.',
1733 label.name, release_version)
1734 label.remove_hosts(hosts=host_list)
1735 mismatch_found = True
1736 if mismatch_found:
Dan Shi1057bae2015-03-30 11:35:09 -07001737 autotest_es.post(use_http=True,
1738 type_str='cros_version_label_mismatch',
1739 metadata={'hostname': self.hostname})
Dan Shi549fb822015-03-24 18:01:11 -07001740 raise error.AutoservError('The host has wrong cros-version label.')
1741
1742
Darren Krahn0bd18e82015-10-28 23:30:46 +00001743 def verify_tpm_status(self):
1744 """ Verify the host's TPM is in a good state.
1745
1746 @raise error.AutoservError: If state is not good.
1747 """
1748 # This cryptohome command emits status information in JSON format. It
1749 # looks something like this:
1750 # {
1751 # "installattrs": {
1752 # "first_install": false,
1753 # "initialized": true,
1754 # "invalid": false,
1755 # "lockbox_index": 536870916,
1756 # "lockbox_nvram_version": 2,
1757 # "secure": true,
1758 # "size": 0,
1759 # "version": 1
1760 # },
1761 # "mounts": [ {
1762 # "enterprise": false,
1763 # "keysets": [ {
1764 # "current": true,
1765 # "index": 0,
1766 # "last_activity": 1330111359,
1767 # "ok": true,
1768 # "scrypt": true,
1769 # "tpm": false
1770 # } ],
1771 # "mounted": true,
1772 # "owner": "dbb3dd34edb181245130e136be51fa08478d3909"
1773 # } ],
1774 # "tpm": {
1775 # "being_owned": false,
1776 # "can_connect": true,
1777 # "can_decrypt": false,
1778 # "can_encrypt": false,
1779 # "can_load_srk": true,
1780 # "can_load_srk_pubkey": true,
1781 # "enabled": true,
1782 # "has_context": true,
1783 # "has_cryptohome_key": false,
1784 # "has_key_handle": false,
1785 # "last_error": 0,
1786 # "owned": true
1787 # }
1788 # }
1789 output = self.run('cryptohome --action=status').stdout.strip()
1790 try:
1791 status = json.loads(output)
1792 except ValueError:
1793 logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
1794 return
1795 try:
1796 tpm = status['tpm']
1797 if (not tpm['enabled'] or not tpm['can_connect'] or
1798 (tpm['owned'] and not tpm['can_load_srk']) or
1799 (tpm['can_load_srk'] and not tpm['can_load_srk_pubkey'])):
1800 logging.error('TPM_VERIFY: The host TPM is in a bad state.')
1801 raise error.AutoservError('The host TPM is in a bad state.')
1802 else:
1803 logging.debug('TPM_VERIFY: The host TPM is in a good state.')
1804 except KeyError:
1805 logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
1806
1807
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001808 def verify_firmware_status(self):
1809 """Verify the host's firmware is in a good state.
1810
1811 @raise error.AutoservError: If state is not good.
1812 """
1813 if self._is_firmware_repair_supported():
Tom Wai-Hong Tam93a29562016-01-23 04:16:53 +08001814 try:
1815 # Read the AP firmware and dump the sections we are interested.
1816 cmd = ('mkdir /tmp/verify_firmware; '
1817 'cd /tmp/verify_firmware; '
1818 'for section in VBLOCK_A VBLOCK_B FW_MAIN_A FW_MAIN_B; '
1819 'do flashrom -r image.bin -i $section:$section; '
1820 'done')
1821 self.run(cmd)
1822
1823 # Verify the firmware blocks A and B.
1824 cmd = ('vbutil_firmware --verify /tmp/verify_firmware/VBLOCK_%c'
1825 ' --signpubkey /usr/share/vboot/devkeys/root_key.vbpubk'
1826 ' --fv /tmp/verify_firmware/FW_MAIN_%c')
1827 for c in ('A', 'B'):
1828 rv = self.run(cmd % (c, c), ignore_status=True)
1829 if rv.exit_status:
1830 raise error.AutoservError(
1831 'Firmware %c is in a bad state.' % c)
1832 finally:
1833 # Remove the tempoary files.
1834 self.run('rm -rf /tmp/verify_firmware')
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001835 else:
1836 logging.info('Do not care about firmware status when the host '
1837 'is not in pools that support firmware repair.')
1838
1839
Shelley Chena11b9e72016-01-21 15:15:18 -08001840 def verify_filesystem_write_status(self):
1841 """Verify the DUT's filesystem is read/writable
1842
1843 @raise error.AutoservError: if filesystem is not writable.
1844 """
1845 # try to create & delete a file
1846 filename = "/mnt/stateful_partition/test.txt"
1847 cmd = 'touch %s && rm %s' % (filename, filename)
1848 rv = self.run(command=cmd, ignore_status=True)
1849
1850 if rv.exit_status == 1:
1851 raise error.AutoservError('DUT filesystem is read-only.')
1852
1853
beepsc87ff602013-07-31 21:53:00 -07001854 def cleanup(self):
MK Ryu35d661e2014-09-25 17:44:10 -07001855 self.run('rm -f %s' % client_constants.CLEANUP_LOGS_PAUSED_FILE)
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001856 try:
beepsc87ff602013-07-31 21:53:00 -07001857 self._restart_ui()
1858 except (error.AutotestRunError, error.AutoservRunError,
1859 FactoryImageCheckerException):
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001860 logging.warning('Unable to restart ui, rebooting device.')
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001861 # Since restarting the UI fails fall back to normal Autotest
1862 # cleanup routines, i.e. reboot the machine.
Fang Deng0ca40e22013-08-27 17:47:44 -07001863 super(CrosHost, self).cleanup()
Simran Basi5e6339a2013-03-21 11:34:32 -07001864 # Check if the rpm outlet was manipulated.
Simran Basid5e5e272012-09-24 15:23:59 -07001865 if self.has_power():
Simran Basi5e6339a2013-03-21 11:34:32 -07001866 self._cleanup_poweron()
Dan Shi549fb822015-03-24 18:01:11 -07001867 self.verify_cros_version_label()
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001868
1869
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001870 def reboot(self, **dargs):
1871 """
1872 This function reboots the site host. The more generic
1873 RemoteHost.reboot() performs sync and sleeps for 5
1874 seconds. This is not necessary for Chrome OS devices as the
1875 sync should be finished in a short time during the reboot
1876 command.
1877 """
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001878 if 'reboot_cmd' not in dargs:
Doug Anderson7d5aeb22014-02-27 15:12:17 -08001879 reboot_timeout = dargs.get('reboot_timeout', 10)
J. Richard Barnette9af19632015-09-25 12:18:03 -07001880 dargs['reboot_cmd'] = ('sleep 1; '
1881 'reboot & sleep %d; '
1882 'reboot -f' % reboot_timeout)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001883 # Enable fastsync to avoid running extra sync commands before reboot.
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001884 if 'fastsync' not in dargs:
1885 dargs['fastsync'] = True
Michael Liangda8c60a2014-06-03 13:24:51 -07001886
Charlie Mooneya8e6dab2014-05-29 14:37:55 -07001887 # For purposes of logging reboot times:
1888 # Get the board name i.e. 'daisy_spring'
Michael Liangca4f5a62014-07-10 15:45:13 -07001889 board_fullname = self.get_board()
1890
1891 # Strip the prefix and add it to dargs.
1892 dargs['board'] = board_fullname[board_fullname.find(':')+1:]
Fang Deng0ca40e22013-08-27 17:47:44 -07001893 super(CrosHost, self).reboot(**dargs)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001894
1895
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001896 def suspend(self, **dargs):
1897 """
1898 This function suspends the site host.
1899 """
1900 suspend_time = dargs.get('suspend_time', 60)
1901 dargs['timeout'] = suspend_time
1902 if 'suspend_cmd' not in dargs:
J. Richard Barnette9af19632015-09-25 12:18:03 -07001903 dargs['suspend_cmd'] = ' && '.join([
1904 'echo 0 > /sys/class/rtc/rtc0/wakealarm',
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001905 'echo +%d > /sys/class/rtc/rtc0/wakealarm' % suspend_time,
J. Richard Barnette9af19632015-09-25 12:18:03 -07001906 'powerd_dbus_suspend --delay=0'])
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001907 super(CrosHost, self).suspend(**dargs)
1908
1909
Simran Basiec564392014-08-25 16:48:09 -07001910 def upstart_status(self, service_name):
1911 """Check the status of an upstart init script.
1912
1913 @param service_name: Service to look up.
1914
1915 @returns True if the service is running, False otherwise.
1916 """
1917 return self.run('status %s | grep start/running' %
1918 service_name).stdout.strip() != ''
1919
1920
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001921 def verify_software(self):
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001922 """Verify working software on a Chrome OS system.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001923
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001924 Tests for the following conditions:
1925 1. All conditions tested by the parent version of this
1926 function.
1927 2. Sufficient space in /mnt/stateful_partition.
Fang Deng6b05f5b2013-03-20 13:42:11 -07001928 3. Sufficient space in /mnt/stateful_partition/encrypted.
1929 4. update_engine answers a simple status request over DBus.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001930
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001931 """
MK Ryu35d661e2014-09-25 17:44:10 -07001932 # Check if a job was crashed on this host.
1933 # If yes, avoid verification until crash-logs are collected.
1934 if self._need_crash_logs():
1935 raise error.AutoservCrashLogCollectRequired(
1936 'Need to collect crash-logs before verification')
1937
Fang Deng0ca40e22013-08-27 17:47:44 -07001938 super(CrosHost, self).verify_software()
Dan Shib8540a52015-07-16 14:18:23 -07001939 default_kilo_inodes_required = CONFIG.get_config_value(
1940 'SERVER', 'kilo_inodes_required', type=int, default=100)
1941 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
1942 kilo_inodes_required = CONFIG.get_config_value(
1943 'SERVER', 'kilo_inodes_required_%s' % board,
1944 type=int, default=default_kilo_inodes_required)
1945 self.check_inodes('/mnt/stateful_partition', kilo_inodes_required)
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001946 self.check_diskspace(
1947 '/mnt/stateful_partition',
Dan Shib8540a52015-07-16 14:18:23 -07001948 CONFIG.get_config_value(
Fang Deng6b05f5b2013-03-20 13:42:11 -07001949 'SERVER', 'gb_diskspace_required', type=float,
1950 default=20.0))
Gaurav Shahe448af82014-06-19 15:18:59 -07001951 encrypted_stateful_path = '/mnt/stateful_partition/encrypted'
1952 # Not all targets build with encrypted stateful support.
1953 if self.path_exists(encrypted_stateful_path):
1954 self.check_diskspace(
1955 encrypted_stateful_path,
Dan Shib8540a52015-07-16 14:18:23 -07001956 CONFIG.get_config_value(
Gaurav Shahe448af82014-06-19 15:18:59 -07001957 'SERVER', 'gb_encrypted_diskspace_required', type=float,
1958 default=0.1))
beepsc87ff602013-07-31 21:53:00 -07001959
Simran Basiec564392014-08-25 16:48:09 -07001960 if not self.upstart_status('system-services'):
Prashanth B5d0a0512014-04-25 12:26:08 -07001961 raise error.AutoservError('Chrome failed to reach login. '
1962 'System services not running.')
1963
beepsc87ff602013-07-31 21:53:00 -07001964 # Factory images don't run update engine,
1965 # goofy controls dbus on these DUTs.
1966 if not self._is_factory_image():
1967 self.run('update_engine_client --status')
Scott Zawalskifbca4a92013-03-04 15:56:42 -05001968 # Makes sure python is present, loads and can use built in functions.
1969 # We have seen cases where importing cPickle fails with undefined
1970 # symbols in cPickle.so.
1971 self.run('python -c "import cPickle"')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001972
Dan Shi549fb822015-03-24 18:01:11 -07001973 self.verify_cros_version_label()
1974
Darren Krahn0bd18e82015-10-28 23:30:46 +00001975 self.verify_tpm_status()
1976
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001977 self.verify_firmware_status()
1978
Shelley Chena11b9e72016-01-21 15:15:18 -08001979 self.verify_filesystem_write_status()
1980
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001981
Dan Shi49ca0932014-11-14 11:22:27 -08001982 def verify_hardware(self):
1983 """Verify hardware system of a Chrome OS system.
1984
1985 Check following hardware conditions:
1986 1. Battery level.
1987 2. Is power adapter connected.
1988 """
1989 logging.info('Battery percentage: %s', self.get_battery_percentage())
Dan Shie9b765d2014-12-29 16:59:49 -08001990 if self.is_ac_connected() is None:
1991 logging.info('Can not determine if the device has power adapter '
1992 'connected.')
1993 else:
1994 logging.info('Device %s power adapter connected and charging.',
1995 'has' if self.is_ac_connected() else 'does not have')
Dan Shi49ca0932014-11-14 11:22:27 -08001996
1997
Fang Deng96667ca2013-08-01 17:46:18 -07001998 def make_ssh_command(self, user='root', port=22, opts='', hosts_file=None,
1999 connect_timeout=None, alive_interval=None):
2000 """Override default make_ssh_command to use options tuned for Chrome OS.
2001
2002 Tuning changes:
2003 - ConnectTimeout=30; maximum of 30 seconds allowed for an SSH
2004 connection failure. Consistency with remote_access.sh.
2005
Samuel Tan2ce155b2015-06-23 18:24:38 -07002006 - ServerAliveInterval=900; which causes SSH to ping connection every
2007 900 seconds. In conjunction with ServerAliveCountMax ensures
2008 that if the connection dies, Autotest will bail out.
Fang Deng96667ca2013-08-01 17:46:18 -07002009 Originally tried 60 secs, but saw frequent job ABORTS where
Samuel Tan2ce155b2015-06-23 18:24:38 -07002010 the test completed successfully. Later increased from 180 seconds to
2011 900 seconds to account for tests where the DUT is suspended for
2012 longer periods of time.
Fang Deng96667ca2013-08-01 17:46:18 -07002013
2014 - ServerAliveCountMax=3; consistency with remote_access.sh.
2015
2016 - ConnectAttempts=4; reduce flakiness in connection errors;
2017 consistency with remote_access.sh.
2018
2019 - UserKnownHostsFile=/dev/null; we don't care about the keys.
2020 Host keys change with every new installation, don't waste
2021 memory/space saving them.
2022
2023 - SSH protocol forced to 2; needed for ServerAliveInterval.
2024
2025 @param user User name to use for the ssh connection.
2026 @param port Port on the target host to use for ssh connection.
2027 @param opts Additional options to the ssh command.
2028 @param hosts_file Ignored.
2029 @param connect_timeout Ignored.
2030 @param alive_interval Ignored.
2031 """
Aviv Keshetc5947fa2013-09-04 14:06:29 -07002032 base_command = ('/usr/bin/ssh -a -x %s %s %s'
2033 ' -o StrictHostKeyChecking=no'
Fang Deng96667ca2013-08-01 17:46:18 -07002034 ' -o UserKnownHostsFile=/dev/null -o BatchMode=yes'
Samuel Tan2ce155b2015-06-23 18:24:38 -07002035 ' -o ConnectTimeout=30 -o ServerAliveInterval=900'
Fang Deng96667ca2013-08-01 17:46:18 -07002036 ' -o ServerAliveCountMax=3 -o ConnectionAttempts=4'
2037 ' -o Protocol=2 -l %s -p %d')
Aviv Keshetc5947fa2013-09-04 14:06:29 -07002038 return base_command % (self._ssh_verbosity_flag, self._ssh_options,
2039 opts, user, port)
Jason Abeleb6f924f2013-11-13 16:01:54 -08002040 def syslog(self, message, tag='autotest'):
2041 """Logs a message to syslog on host.
2042
2043 @param message String message to log into syslog
2044 @param tag String tag prefix for syslog
2045
2046 """
2047 self.run('logger -t "%s" "%s"' % (tag, message))
2048
2049
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002050 def _ping_check_status(self, status):
2051 """Ping the host once, and return whether it has a given status.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002052
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002053 @param status Check the ping status against this value.
2054 @return True iff `status` and the result of ping are the same
2055 (i.e. both True or both False).
2056
2057 """
2058 ping_val = utils.ping(self.hostname, tries=1, deadline=1)
2059 return not (status ^ (ping_val == 0))
2060
2061 def _ping_wait_for_status(self, status, timeout):
2062 """Wait for the host to have a given status (UP or DOWN).
2063
2064 Status is checked by polling. Polling will not last longer
2065 than the number of seconds in `timeout`. The polling
2066 interval will be long enough that only approximately
2067 _PING_WAIT_COUNT polling cycles will be executed, subject
2068 to a maximum interval of about one minute.
2069
2070 @param status Waiting will stop immediately if `ping` of the
2071 host returns this status.
2072 @param timeout Poll for at most this many seconds.
2073 @return True iff the host status from `ping` matched the
2074 requested status at the time of return.
2075
2076 """
2077 # _ping_check_status() takes about 1 second, hence the
2078 # "- 1" in the formula below.
2079 poll_interval = min(int(timeout / self._PING_WAIT_COUNT), 60) - 1
2080 end_time = time.time() + timeout
2081 while time.time() <= end_time:
2082 if self._ping_check_status(status):
2083 return True
2084 if poll_interval > 0:
2085 time.sleep(poll_interval)
2086
2087 # The last thing we did was sleep(poll_interval), so it may
2088 # have been too long since the last `ping`. Check one more
2089 # time, just to be sure.
2090 return self._ping_check_status(status)
2091
2092 def ping_wait_up(self, timeout):
2093 """Wait for the host to respond to `ping`.
2094
2095 N.B. This method is not a reliable substitute for
2096 `wait_up()`, because a host that responds to ping will not
2097 necessarily respond to ssh. This method should only be used
2098 if the target DUT can be considered functional even if it
2099 can't be reached via ssh.
2100
2101 @param timeout Minimum time to allow before declaring the
2102 host to be non-responsive.
2103 @return True iff the host answered to ping before the timeout.
2104
2105 """
2106 return self._ping_wait_for_status(self._PING_STATUS_UP, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002107
Andrew Bresticker678c0c72013-01-22 10:44:09 -08002108 def ping_wait_down(self, timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002109 """Wait until the host no longer responds to `ping`.
2110
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002111 This function can be used as a slightly faster version of
2112 `wait_down()`, by avoiding potentially long ssh timeouts.
2113
2114 @param timeout Minimum time to allow for the host to become
2115 non-responsive.
2116 @return True iff the host quit answering ping before the
2117 timeout.
2118
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002119 """
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002120 return self._ping_wait_for_status(self._PING_STATUS_DOWN, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002121
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002122 def test_wait_for_sleep(self, sleep_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002123 """Wait for the client to enter low-power sleep mode.
2124
2125 The test for "is asleep" can't distinguish a system that is
2126 powered off; to confirm that the unit was asleep, it is
2127 necessary to force resume, and then call
2128 `test_wait_for_resume()`.
2129
2130 This function is expected to be called from a test as part
2131 of a sequence like the following:
2132
2133 ~~~~~~~~
2134 boot_id = host.get_boot_id()
2135 # trigger sleep on the host
2136 host.test_wait_for_sleep()
2137 # trigger resume on the host
2138 host.test_wait_for_resume(boot_id)
2139 ~~~~~~~~
2140
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002141 @param sleep_timeout time limit in seconds to allow the host sleep.
2142
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002143 @exception TestFail The host did not go to sleep within
2144 the allowed time.
2145 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002146 if sleep_timeout is None:
2147 sleep_timeout = self.SLEEP_TIMEOUT
2148
2149 if not self.ping_wait_down(timeout=sleep_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002150 raise error.TestFail(
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002151 'client failed to sleep after %d seconds' % sleep_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002152
2153
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002154 def test_wait_for_resume(self, old_boot_id, resume_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002155 """Wait for the client to resume from low-power sleep mode.
2156
2157 The `old_boot_id` parameter should be the value from
2158 `get_boot_id()` obtained prior to entering sleep mode. A
2159 `TestFail` exception is raised if the boot id changes.
2160
2161 See @ref test_wait_for_sleep for more on this function's
2162 usage.
2163
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002164 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002165 target host went to sleep.
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002166 @param resume_timeout time limit in seconds to allow the host up.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002167
2168 @exception TestFail The host did not respond within the
2169 allowed time.
2170 @exception TestFail The host responded, but the boot id test
2171 indicated a reboot rather than a sleep
2172 cycle.
2173 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002174 if resume_timeout is None:
2175 resume_timeout = self.RESUME_TIMEOUT
2176
2177 if not self.wait_up(timeout=resume_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002178 raise error.TestFail(
2179 'client failed to resume from sleep after %d seconds' %
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002180 resume_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002181 else:
2182 new_boot_id = self.get_boot_id()
2183 if new_boot_id != old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002184 logging.error('client rebooted (old boot %s, new boot %s)',
2185 old_boot_id, new_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002186 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002187 'client rebooted, but sleep was expected')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002188
2189
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002190 def test_wait_for_shutdown(self, shutdown_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002191 """Wait for the client to shut down.
2192
2193 The test for "has shut down" can't distinguish a system that
2194 is merely asleep; to confirm that the unit was down, it is
2195 necessary to force boot, and then call test_wait_for_boot().
2196
2197 This function is expected to be called from a test as part
2198 of a sequence like the following:
2199
2200 ~~~~~~~~
2201 boot_id = host.get_boot_id()
2202 # trigger shutdown on the host
2203 host.test_wait_for_shutdown()
2204 # trigger boot on the host
2205 host.test_wait_for_boot(boot_id)
2206 ~~~~~~~~
2207
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002208 @param shutdown_timeout time limit in seconds to allow the host down.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002209 @exception TestFail The host did not shut down within the
2210 allowed time.
2211 """
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002212 if shutdown_timeout is None:
2213 shutdown_timeout = self.SHUTDOWN_TIMEOUT
2214
2215 if not self.ping_wait_down(timeout=shutdown_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002216 raise error.TestFail(
2217 'client failed to shut down after %d seconds' %
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002218 shutdown_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002219
2220
2221 def test_wait_for_boot(self, old_boot_id=None):
2222 """Wait for the client to boot from cold power.
2223
2224 The `old_boot_id` parameter should be the value from
2225 `get_boot_id()` obtained prior to shutting down. A
2226 `TestFail` exception is raised if the boot id does not
2227 change. The boot id test is omitted if `old_boot_id` is not
2228 specified.
2229
2230 See @ref test_wait_for_shutdown for more on this function's
2231 usage.
2232
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002233 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002234 shut down.
2235
2236 @exception TestFail The host did not respond within the
2237 allowed time.
2238 @exception TestFail The host responded, but the boot id test
2239 indicated that there was no reboot.
2240 """
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002241 if not self.wait_up(timeout=self.REBOOT_TIMEOUT):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002242 raise error.TestFail(
2243 'client failed to reboot after %d seconds' %
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002244 self.REBOOT_TIMEOUT)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002245 elif old_boot_id:
2246 if self.get_boot_id() == old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002247 logging.error('client not rebooted (boot %s)',
2248 old_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002249 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002250 'client is back up, but did not reboot')
Simran Basid5e5e272012-09-24 15:23:59 -07002251
2252
2253 @staticmethod
2254 def check_for_rpm_support(hostname):
2255 """For a given hostname, return whether or not it is powered by an RPM.
2256
Simran Basi1df55112013-09-06 11:25:09 -07002257 @param hostname: hostname to check for rpm support.
2258
Simran Basid5e5e272012-09-24 15:23:59 -07002259 @return None if this host does not follows the defined naming format
2260 for RPM powered DUT's in the lab. If it does follow the format,
2261 it returns a regular expression MatchObject instead.
2262 """
Fang Dengbaff9082015-01-06 13:46:15 -08002263 return re.match(CrosHost._RPM_HOSTNAME_REGEX, hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002264
2265
2266 def has_power(self):
2267 """For this host, return whether or not it is powered by an RPM.
2268
2269 @return True if this host is in the CROS lab and follows the defined
2270 naming format.
2271 """
Fang Deng0ca40e22013-08-27 17:47:44 -07002272 return CrosHost.check_for_rpm_support(self.hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002273
2274
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002275 def _set_power(self, state, power_method):
2276 """Sets the power to the host via RPM, Servo or manual.
2277
2278 @param state Specifies which power state to set to DUT
2279 @param power_method Specifies which method of power control to
2280 use. By default "RPM" will be used. Valid values
2281 are the strings "RPM", "manual", "servoj10".
2282
2283 """
2284 ACCEPTABLE_STATES = ['ON', 'OFF']
2285
2286 if state.upper() not in ACCEPTABLE_STATES:
2287 raise error.TestError('State must be one of: %s.'
2288 % (ACCEPTABLE_STATES,))
2289
2290 if power_method == self.POWER_CONTROL_SERVO:
2291 logging.info('Setting servo port J10 to %s', state)
2292 self.servo.set('prtctl3_pwren', state.lower())
2293 time.sleep(self._USB_POWER_TIMEOUT)
2294 elif power_method == self.POWER_CONTROL_MANUAL:
2295 logging.info('You have %d seconds to set the AC power to %s.',
2296 self._POWER_CYCLE_TIMEOUT, state)
2297 time.sleep(self._POWER_CYCLE_TIMEOUT)
2298 else:
2299 if not self.has_power():
2300 raise error.TestFail('DUT does not have RPM connected.')
Simran Basi5e6339a2013-03-21 11:34:32 -07002301 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
2302 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, True,
2303 hostname=self.hostname)
Simran Basi1df55112013-09-06 11:25:09 -07002304 rpm_client.set_power(self.hostname, state.upper(), timeout_mins=5)
Simran Basid5e5e272012-09-24 15:23:59 -07002305
2306
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002307 def power_off(self, power_method=POWER_CONTROL_RPM):
2308 """Turn off power to this host via RPM, Servo or manual.
2309
2310 @param power_method Specifies which method of power control to
2311 use. By default "RPM" will be used. Valid values
2312 are the strings "RPM", "manual", "servoj10".
2313
2314 """
2315 self._set_power('OFF', power_method)
Simran Basid5e5e272012-09-24 15:23:59 -07002316
2317
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002318 def power_on(self, power_method=POWER_CONTROL_RPM):
2319 """Turn on power to this host via RPM, Servo or manual.
2320
2321 @param power_method Specifies which method of power control to
2322 use. By default "RPM" will be used. Valid values
2323 are the strings "RPM", "manual", "servoj10".
2324
2325 """
2326 self._set_power('ON', power_method)
2327
2328
2329 def power_cycle(self, power_method=POWER_CONTROL_RPM):
2330 """Cycle power to this host by turning it OFF, then ON.
2331
2332 @param power_method Specifies which method of power control to
2333 use. By default "RPM" will be used. Valid values
2334 are the strings "RPM", "manual", "servoj10".
2335
2336 """
2337 if power_method in (self.POWER_CONTROL_SERVO,
2338 self.POWER_CONTROL_MANUAL):
2339 self.power_off(power_method=power_method)
2340 time.sleep(self._POWER_CYCLE_TIMEOUT)
2341 self.power_on(power_method=power_method)
2342 else:
2343 rpm_client.set_power(self.hostname, 'CYCLE')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002344
2345
2346 def get_platform(self):
2347 """Determine the correct platform label for this host.
2348
2349 @returns a string representing this host's platform.
2350 """
2351 crossystem = utils.Crossystem(self)
2352 crossystem.init()
2353 # Extract fwid value and use the leading part as the platform id.
2354 # fwid generally follow the format of {platform}.{firmware version}
2355 # Example: Alex.X.YYY.Z or Google_Alex.X.YYY.Z
2356 platform = crossystem.fwid().split('.')[0].lower()
2357 # Newer platforms start with 'Google_' while the older ones do not.
2358 return platform.replace('google_', '')
2359
2360
Hung-ying Tyanb1328032014-04-01 14:18:54 +08002361 def get_architecture(self):
2362 """Determine the correct architecture label for this host.
2363
2364 @returns a string representing this host's architecture.
2365 """
2366 crossystem = utils.Crossystem(self)
2367 crossystem.init()
2368 return crossystem.arch()
2369
2370
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002371 def get_chrome_version(self):
2372 """Gets the Chrome version number and milestone as strings.
2373
2374 Invokes "chrome --version" to get the version number and milestone.
2375
2376 @return A tuple (chrome_ver, milestone) where "chrome_ver" is the
2377 current Chrome version number as a string (in the form "W.X.Y.Z")
2378 and "milestone" is the first component of the version number
2379 (the "W" from "W.X.Y.Z"). If the version number cannot be parsed
2380 in the "W.X.Y.Z" format, the "chrome_ver" will be the full output
2381 of "chrome --version" and the milestone will be the empty string.
2382
2383 """
MK Ryu35d661e2014-09-25 17:44:10 -07002384 version_string = self.run(client_constants.CHROME_VERSION_COMMAND).stdout
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002385 return utils.parse_chrome_version(version_string)
2386
J. Richard Barnetted2af5852016-02-05 15:03:10 -08002387
Aviv Keshet74c89a92013-02-04 15:18:30 -08002388 @label_decorator()
Simran Basic6f1f7a2012-10-16 10:47:46 -07002389 def get_board(self):
2390 """Determine the correct board label for this host.
2391
2392 @returns a string representing this host's board.
2393 """
2394 release_info = utils.parse_cmd_output('cat /etc/lsb-release',
2395 run_method=self.run)
J. Richard Barnetted2af5852016-02-05 15:03:10 -08002396 return (ds_constants.BOARD_PREFIX +
2397 release_info['CHROMEOS_RELEASE_BOARD'])
Simran Basic6f1f7a2012-10-16 10:47:46 -07002398
2399
Aviv Keshet74c89a92013-02-04 15:18:30 -08002400 @label_decorator('lightsensor')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002401 def has_lightsensor(self):
2402 """Determine the correct board label for this host.
2403
2404 @returns the string 'lightsensor' if this host has a lightsensor or
2405 None if it does not.
2406 """
2407 search_cmd = "find -L %s -maxdepth 4 | egrep '%s'" % (
Richard Barnette82c35912012-11-20 10:09:10 -08002408 self._LIGHTSENSOR_SEARCH_DIR, '|'.join(self._LIGHTSENSOR_FILES))
Simran Basic6f1f7a2012-10-16 10:47:46 -07002409 try:
2410 # Run the search cmd following the symlinks. Stderr_tee is set to
2411 # None as there can be a symlink loop, but the command will still
2412 # execute correctly with a few messages printed to stderr.
2413 self.run(search_cmd, stdout_tee=None, stderr_tee=None)
2414 return 'lightsensor'
2415 except error.AutoservRunError:
2416 # egrep exited with a return code of 1 meaning none of the possible
2417 # lightsensor files existed.
2418 return None
2419
2420
Aviv Keshet74c89a92013-02-04 15:18:30 -08002421 @label_decorator('bluetooth')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002422 def has_bluetooth(self):
2423 """Determine the correct board label for this host.
2424
2425 @returns the string 'bluetooth' if this host has bluetooth or
2426 None if it does not.
2427 """
2428 try:
2429 self.run('test -d /sys/class/bluetooth/hci0')
2430 # test exited with a return code of 0.
2431 return 'bluetooth'
2432 except error.AutoservRunError:
2433 # test exited with a return code 1 meaning the directory did not
2434 # exist.
2435 return None
2436
2437
Bill Richardson4f595f52014-02-13 16:20:26 -08002438 @label_decorator('ec')
2439 def get_ec(self):
2440 """
2441 Determine the type of EC on this host.
2442
2443 @returns a string representing this host's embedded controller type.
2444 At present, it only returns "ec:cros", for Chrome OS ECs. Other types
2445 of EC (or none) don't return any strings, since no tests depend on
2446 those.
2447 """
2448 cmd = 'mosys ec info'
2449 # The output should look like these, so that the last field should
2450 # match our EC version scheme:
2451 #
2452 # stm | stm32f100 | snow_v1.3.139-375eb9f
2453 # ti | Unknown-10de | peppy_v1.5.114-5d52788
2454 #
2455 # Non-Chrome OS ECs will look like these:
2456 #
2457 # ENE | KB932 | 00BE107A00
2458 # ite | it8518 | 3.08
2459 #
2460 # And some systems don't have ECs at all (Lumpy, for example).
2461 regexp = r'^.*\|\s*(\S+_v\d+\.\d+\.\d+-[0-9a-f]+)\s*$'
2462
2463 ecinfo = self.run(command=cmd, ignore_status=True)
2464 if ecinfo.exit_status == 0:
2465 res = re.search(regexp, ecinfo.stdout)
2466 if res:
2467 logging.info("EC version is %s", res.groups()[0])
2468 return 'ec:cros'
2469 logging.info("%s got: %s", cmd, ecinfo.stdout)
2470 # Has an EC, but it's not a Chrome OS EC
2471 return None
2472 logging.info("%s exited with status %d", cmd, ecinfo.exit_status)
2473 # No EC present
2474 return None
2475
2476
Alec Berg31b932b2014-04-04 16:09:11 -07002477 @label_decorator('accels')
2478 def get_accels(self):
2479 """
2480 Determine the type of accelerometers on this host.
2481
2482 @returns a string representing this host's accelerometer type.
2483 At present, it only returns "accel:cros-ec", for accelerometers
2484 attached to a Chrome OS EC, or none, if no accelerometers.
2485 """
2486 # Check to make sure we have ectool
2487 rv = self.run('which ectool', ignore_status=True)
2488 if rv.exit_status:
2489 logging.info("No ectool cmd found, assuming no EC accelerometers")
2490 return None
2491
2492 # Check that the EC supports the motionsense command
2493 rv = self.run('ectool motionsense', ignore_status=True)
2494 if rv.exit_status:
2495 logging.info("EC does not support motionsense command "
2496 "assuming no EC accelerometers")
2497 return None
2498
2499 # Check that EC motion sensors are active
2500 active = self.run('ectool motionsense active').stdout.split('\n')
2501 if active[0] == "0":
2502 logging.info("Motion sense inactive, assuming no EC accelerometers")
2503 return None
2504
2505 logging.info("EC accelerometers found")
2506 return 'accel:cros-ec'
2507
2508
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002509 @label_decorator('chameleon')
2510 def has_chameleon(self):
2511 """Determine if a Chameleon connected to this host.
2512
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002513 @returns a list containing two strings ('chameleon' and
2514 'chameleon:' + label, e.g. 'chameleon:hdmi') if this host
2515 has a Chameleon or None if it has not.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002516 """
2517 if self._chameleon_host:
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002518 return ['chameleon', 'chameleon:' + self.chameleon.get_label()]
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002519 else:
2520 return None
2521
2522
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002523 @label_decorator('audio_loopback_dongle')
2524 def has_loopback_dongle(self):
2525 """Determine if an audio loopback dongle is plugged to this host.
2526
2527 @returns 'audio_loopback_dongle' when there is an audio loopback dongle
2528 plugged to this host.
2529 None when there is no audio loopback dongle
2530 plugged to this host.
2531 """
Cheng-Yi Chiang8de78112015-05-27 14:47:08 +08002532 nodes_info = self.run(command=cras_utils.get_cras_nodes_cmd(),
2533 ignore_status=True).stdout
2534 if (cras_utils.node_type_is_plugged('HEADPHONE', nodes_info) and
2535 cras_utils.node_type_is_plugged('MIC', nodes_info)):
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002536 return 'audio_loopback_dongle'
2537 else:
2538 return None
2539
2540
Derek Basehorec71ff622014-07-07 15:18:40 -07002541 @label_decorator('power_supply')
2542 def get_power_supply(self):
2543 """
2544 Determine what type of power supply the host has
2545
2546 @returns a string representing this host's power supply.
2547 'power:battery' when the device has a battery intended for
2548 extended use
2549 'power:AC_primary' when the device has a battery not intended
2550 for extended use (for moving the machine, etc)
2551 'power:AC_only' when the device has no battery at all.
2552 """
2553 psu = self.run(command='mosys psu type', ignore_status=True)
2554 if psu.exit_status:
2555 # The psu command for mosys is not included for all platforms. The
2556 # assumption is that the device will have a battery if the command
2557 # is not found.
2558 return 'power:battery'
2559
2560 psu_str = psu.stdout.strip()
2561 if psu_str == 'unknown':
2562 return None
2563
2564 return 'power:%s' % psu_str
2565
2566
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002567 @label_decorator('storage')
2568 def get_storage(self):
2569 """
2570 Determine the type of boot device for this host.
2571
2572 Determine if the internal device is SCSI or dw_mmc device.
2573 Then check that it is SSD or HDD or eMMC or something else.
2574
2575 @returns a string representing this host's internal device type.
2576 'storage:ssd' when internal device is solid state drive
2577 'storage:hdd' when internal device is hard disk drive
2578 'storage:mmc' when internal device is mmc drive
2579 None When internal device is something else or
2580 when we are unable to determine the type
2581 """
2582 # The output should be /dev/mmcblk* for SD/eMMC or /dev/sd* for scsi
2583 rootdev_cmd = ' '.join(['. /usr/sbin/write_gpt.sh;',
2584 '. /usr/share/misc/chromeos-common.sh;',
2585 'load_base_vars;',
2586 'get_fixed_dst_drive'])
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002587 rootdev = self.run(command=rootdev_cmd, ignore_status=True)
2588 if rootdev.exit_status:
2589 logging.info("Fail to run %s", rootdev_cmd)
2590 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002591 rootdev_str = rootdev.stdout.strip()
2592
2593 if not rootdev_str:
2594 return None
2595
2596 rootdev_base = os.path.basename(rootdev_str)
2597
2598 mmc_pattern = '/dev/mmcblk[0-9]'
2599 if re.match(mmc_pattern, rootdev_str):
2600 # Use type to determine if the internal device is eMMC or somthing
2601 # else. We can assume that MMC is always an internal device.
2602 type_cmd = 'cat /sys/block/%s/device/type' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002603 type = self.run(command=type_cmd, ignore_status=True)
2604 if type.exit_status:
2605 logging.info("Fail to run %s", type_cmd)
2606 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002607 type_str = type.stdout.strip()
2608
2609 if type_str == 'MMC':
2610 return 'storage:mmc'
2611
2612 scsi_pattern = '/dev/sd[a-z]+'
2613 if re.match(scsi_pattern, rootdev.stdout):
2614 # Read symlink for /sys/block/sd* to determine if the internal
2615 # device is connected via ata or usb.
2616 link_cmd = 'readlink /sys/block/%s' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002617 link = self.run(command=link_cmd, ignore_status=True)
2618 if link.exit_status:
2619 logging.info("Fail to run %s", link_cmd)
2620 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002621 link_str = link.stdout.strip()
2622 if 'usb' in link_str:
2623 return None
2624
2625 # Read rotation to determine if the internal device is ssd or hdd.
2626 rotate_cmd = str('cat /sys/block/%s/queue/rotational'
2627 % rootdev_base)
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002628 rotate = self.run(command=rotate_cmd, ignore_status=True)
2629 if rotate.exit_status:
2630 logging.info("Fail to run %s", rotate_cmd)
2631 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002632 rotate_str = rotate.stdout.strip()
2633
2634 rotate_dict = {'0':'storage:ssd', '1':'storage:hdd'}
2635 return rotate_dict.get(rotate_str)
2636
2637 # All other internal device / error case will always fall here
2638 return None
2639
2640
Dan Shi4e9a2aa2014-03-24 14:28:42 -07002641 @label_decorator('servo')
2642 def get_servo(self):
2643 """Determine if the host has a servo attached.
2644
2645 If the host has a working servo attached, it should have a servo label.
2646
2647 @return: string 'servo' if the host has servo attached. Otherwise,
2648 returns None.
2649 """
2650 return 'servo' if self._servo_host else None
2651
2652
Dan Shi5beba472014-05-28 22:46:07 -07002653 @label_decorator('video_labels')
2654 def get_video_labels(self):
2655 """Run /usr/local/bin/avtest_label_detect to get a list of video labels.
2656
2657 Sample output of avtest_label_detect:
2658 Detected label: hw_video_acc_vp8
2659 Detected label: webcam
2660
2661 @return: A list of labels detected by tool avtest_label_detect.
2662 """
2663 try:
2664 result = self.run('/usr/local/bin/avtest_label_detect').stdout
2665 return re.findall('^Detected label: (\w+)$', result, re.M)
2666 except error.AutoservRunError:
2667 # The tool is not installed.
2668 return []
2669
2670
mussa584b4462014-06-20 15:13:28 -07002671 @label_decorator('video_glitch_detection')
2672 def is_video_glitch_detection_supported(self):
2673 """ Determine if a board under test is supported for video glitch
2674 detection tests.
2675
2676 @return: 'video_glitch_detection' if board is supported, None otherwise.
2677 """
Mussa5b589052015-10-26 17:55:26 -07002678 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
mussa584b4462014-06-20 15:13:28 -07002679
Mussa5b589052015-10-26 17:55:26 -07002680 if board in video_test_constants.SUPPORTED_BOARDS:
2681 return 'video_glitch_detection'
mussa584b4462014-06-20 15:13:28 -07002682
Mussa5b589052015-10-26 17:55:26 -07002683 return None
mussa584b4462014-06-20 15:13:28 -07002684
mussa584b4462014-06-20 15:13:28 -07002685
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002686 @label_decorator('touch_labels')
2687 def get_touch(self):
2688 """
2689 Determine whether board under test has a touchpad or touchscreen.
2690
2691 @return: A list of some combination of 'touchscreen' and 'touchpad',
2692 depending on what is present on the device.
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002693
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002694 """
2695 labels = []
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002696 looking_for = ['touchpad', 'touchscreen']
2697 player = input_playback.InputPlayback()
2698 input_events = self.run('ls /dev/input/event*').stdout.strip().split()
2699 filename = '/tmp/touch_labels'
2700 for event in input_events:
2701 self.run('evtest %s > %s' % (event, filename), timeout=1,
2702 ignore_timeout=True)
2703 properties = self.run('cat %s' % filename).stdout
2704 input_type = player._determine_input_type(properties)
2705 if input_type in looking_for:
2706 labels.append(input_type)
2707 looking_for.remove(input_type)
2708 if len(looking_for) == 0:
2709 break
2710 self.run('rm %s' % filename)
2711
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002712 return labels
2713
Hung-ying Tyana39b0542015-06-30 10:36:42 +08002714
2715 @label_decorator('internal_display')
2716 def has_internal_display(self):
2717 """Determine if the device under test is equipped with an internal
2718 display.
2719
2720 @return: 'internal_display' if one is present; None otherwise.
2721 """
2722 from autotest_lib.client.cros.graphics import graphics_utils
2723 from autotest_lib.client.common_lib import utils as common_utils
2724
2725 def __system_output(cmd):
2726 return self.run(cmd).stdout
2727
2728 def __read_file(remote_path):
2729 return self.run('cat %s' % remote_path).stdout
2730
2731 # Hijack the necessary client functions so that we can take advantage
2732 # of the client lib here.
2733 # FIXME: find a less hacky way than this
2734 original_system_output = utils.system_output
2735 original_read_file = common_utils.read_file
2736 utils.system_output = __system_output
2737 common_utils.read_file = __read_file
2738 try:
2739 return ('internal_display' if graphics_utils.has_internal_display()
2740 else None)
2741 finally:
2742 utils.system_output = original_system_output
2743 common_utils.read_file = original_read_file
2744
2745
Eric Carusoee673ac2015-08-05 17:03:04 -07002746 @label_decorator('lucidsleep')
2747 def has_lucid_sleep_support(self):
2748 """Determine if the device under test has support for lucid sleep.
2749
2750 @return 'lucidsleep' if this board supports lucid sleep; None otherwise
2751 """
2752 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2753 return 'lucidsleep' if board in LUCID_SLEEP_BOARDS else None
2754
2755
Dan Shi85276d42014-04-08 22:11:45 -07002756 def is_boot_from_usb(self):
2757 """Check if DUT is boot from USB.
2758
2759 @return: True if DUT is boot from usb.
2760 """
2761 device = self.run('rootdev -s -d').stdout.strip()
2762 removable = int(self.run('cat /sys/block/%s/removable' %
2763 os.path.basename(device)).stdout.strip())
2764 return removable == 1
Helen Zhang17dae2b2014-11-11 09:25:52 -08002765
2766
2767 def read_from_meminfo(self, key):
Dan Shi49ca0932014-11-14 11:22:27 -08002768 """Return the memory info from /proc/meminfo
Helen Zhang17dae2b2014-11-11 09:25:52 -08002769
2770 @param key: meminfo requested
2771
2772 @return the memory value as a string
2773
2774 """
Helen Zhang17dae2b2014-11-11 09:25:52 -08002775 meminfo = self.run('grep %s /proc/meminfo' % key).stdout.strip()
2776 logging.debug('%s', meminfo)
2777 return int(re.search(r'\d+', meminfo).group(0))
Rohit Makasana8a4923c2015-08-13 17:04:26 -07002778
2779
2780 def get_board_type(self):
2781 """
2782 Get the DUT's device type from /etc/lsb-release.
Danny Chan471a8d12015-08-18 14:57:41 -07002783 DEVICETYPE can be one of CHROMEBOX, CHROMEBASE, CHROMEBOOK or more.
2784
2785 @return value of DEVICETYPE param from lsb-release.
Rohit Makasana8a4923c2015-08-13 17:04:26 -07002786 """
Danny Chan471a8d12015-08-18 14:57:41 -07002787 device_type = self.run('grep DEVICETYPE /etc/lsb-release',
2788 ignore_status=True).stdout
2789 if device_type:
Kalin Stoyanov524310b2015-08-21 16:24:04 -07002790 return device_type.split('=')[-1].strip()
Danny Chan471a8d12015-08-18 14:57:41 -07002791 return ''
Gilad Arnolda76bef02015-09-29 13:55:15 -07002792
2793
2794 def get_os_type(self):
2795 return 'cros'
Simran Basia5522a32015-10-06 11:01:24 -07002796
2797
2798 def enable_adb_testing(self):
2799 """Mark this host as an adb tester."""
Dan Shia2872172015-10-31 01:16:51 -07002800 self.run('touch %s' % constants.ANDROID_TESTER_FILEFLAG)